About

learn more and get a capabilities brief

click here to set one up

INTELCENTER BACKGROUND
More than 30 years experience in national security intelligence work.

IntelCenter's focus is threat actor targeted manually collected data that is manually processed with an AI layer added on top along with metadata extraction and 3rd party data enrichment. A large portion of what IntelCenter collects and exploits is threat actor generated content. IntelCenter has the largest repository in the world of this data for terrorist, rebel, separatist and proxy groups and has been working terrorism targets since 1990.

IntelCenter has six different platforms, to include a facial recognition tool for searching its holdings, and can also provide data exports that can be ingested into wherever they are needed. IntelCenter's data is also processed through more than 35 different AIs to further discovery, analysis and exploitation opportunities.

IntelCenter has more than 425 million data points across both target sets. IntelCenter's counterterrorism facial recognition solution has 2.4M faces that can be searched in under a second.

IntelCenter is a privately held company founded in 1989. It is based in the Washington, DC area.



INSIGHT INTO PAST EXPERIENCE
Extensive record of pioneering new initiatives and levels of service/impact.

We are significantly limited in our ability to provide examples due to our work with intelligence agencies and security restrictions, however, a few examples are provided below that will give you a better idea of some of our work.

• Cited by the Central Intelligence Agency's (CIA) Open Source Center (OSC) Director Doug Naquin as a key resource for obtaining terrorist videos from al-Qaeda before the group released them publicly and also to understand the significance of terrorist video material. Speaking about how OSC uses our services to an Office of the Director of National Intelligence (ODNI) conference, Doug Naquin said, "[our company] has sources or insight that somehow gets him advance notice to some of these. And he also does analysis on – does a lot of what I call the so-what, not just the video came up but what it means in context of it. This is just an example of being able to access outside expertise."

• Developed analytical models to visualize key statements from terrorist groups in order to be able to track changes in focus, identify shifts in targeting patterns and identifying the impact of counterterrorism and other operations on groups.

• Successfully identified targeting patterns through messaging analysis in the early-mid 2000s when al-Qaeda shifted its attacks from US allies participating in Afghanistan to Arab governments, as well as a video uptick that occurred in Afghanistan 6-months prior to the appearance of tactics such as roadside bombings, suicide bombings and others that were previously only being used in Iraq.

• Developed the most comprehensive library of terrorist/rebel video material going back to the early 1990s and the database that allows it to be searched and exploited.

• Developed the Significant Terrorist Event Report (STER) series which is used throughout the US and elsewhere by key law enforcement, military and intelligence services to understand the immediate impact of a terrorist attack as it's unfolding and to allow them to identify key security measures they need to put into place in the minutes, hours and days following the attack.

• Connected key pieces of information and obtained critical video material in the immediate aftermath of the Times Square attack to connect the attack to Tehrik-i Tailban Pakistan (TTP).

• Identified key indicators following the Delta attack which marked al-Qaeda in the Arabian Peninsula's (AQAP) intent to continue operations outside of its immediate regional area.