Span alternate regions, languages and network protocols. Silo for Research spins up one-time-use browser instances that give you access to content across geographies and web protocols. Regardless of the destination resource, your identity or affiliation is never exposed. Match your persona to the specific investigation needs and blend in with the crowd by leveraging a tool built to support your tradecraft.
Silo for Research supports collections of all types of web content as the analyst needs it, or over a period of time. Automation tools allow you to set up regular collection routines to capture a range of web content types, transform the content to a format of your choice and securely store it in the cloud.
Investigators may be required to capture and collect content as part of their process. And to maintain efficacy of potential evidence, a proper chain of control and evidentiary requirements must be met. Silo for Research integrates with Authentic8 Secure Storage, an encrypted, audited cloud-based storage repository for users and groups.
From digital signature to advanced tracking across the latest social media sites, you need to keep your analysts current with the latest techniques. Authentic8 OSINT Academy provides tradecraft training for all types of users, from executives who need to minimize their digital profile to experienced research analysts conducting deep investigations across the dark web.
With Silo for Research's managed attribution functionality, you can completely customize how you appear to sites and the people you interact with online. Manipulate a variety of your device details including language, time zone and keyboard settings, as well as the browser, OS and other elements. Appear to be browsing from any of Authentic8's dozens of global egress nodes, and show a local IP address that never refers back to you or your organization.
Yes, dark web access is seamlessly integrated within Silo for Research and its suite of analyst tools. You do not need a separate, standalone dark web browser. This integration provides investigators with full isolation from dark web cyberthreats (e.g., malware-laden sites, forums, marketplaces) and anonymity from counter-surveillance efforts utilized by malicious actors.
Yes, Silo for Research integrates with Authentic8 Secure Storage, an encrypted, audited and cloud-based storage repository for users and groups. Investigators may be required to capture and collect content as part of their process. And to maintain efficacy of potential evidence, a proper chain of control and evidentiary requirements must be met.
Collected data needs to be logged, attributed to an analyst and checked for validity. Chain of custody protections are critical to proper collection. When using Silo for Research collection tools — whether manual or automated — all aspects of the process are logged and available for post-facto review.
Yes, Silo for Research is a FedRAMP-authorized service. It has been assessed and approved as a cloud service offering (CSO) that meets the stringent security requirements to process, store and transmit federal government data.
Learn how Authentic8's unique approach meets the needs of online investigations for financial fraud, AML, threat intelligence, OSINT and other fields
Without the ability to control details of your digital fingerprint, investigative targets could uncover your identity and intent — and spoil your investigation or put you at personal risk.
Authentic8 engineers curated a list of the 21 most widely used OSINT research tools for cybersecurity researchers, analysts and other security professionals