
Paliscope was hired by a specialist in a military intelligence unit with a counter-intelligence mandate who was also responsible for detecting and investigating concerted disinformation campaigns by hostile foreign intelligence actors.
During a period of heightened geopolitical tensions, they observed an uptick in the level of disinformation circulating across social media from individuals claiming to be citizens of their country. Before establishing a relationship with Paliscope, they were wholly reliant on using outdated and non-secure means to identify and report disinformation campaigns.
Additionally, they had no means to work collaboratively by sharing investigative workloads between their team of six intelligence analysts.
Additionally, their team coordinates with several other tactical intelligence teams responsible for detecting financial crimes and child sexual abuse. This means that they receive within the region of 2000 reports per week; such reports include HUMINT source reporting cellular metadata and information extracted from open sources.
Before embarking on a journey with Paliscope, they simply could not keep up with their workload – meaning that the risk of criminals going unnoticed was on an upward trend.

As part of their daily routine, they actively pull raw data from open sources that they had been collecting over a substantial period of time – this included data obtained from instant messaging and social media.
However, they had no meaningful way to analyze this vast amount of data and use it to corroborate ongoing cases concerning disinformation. By establishing an effective relationship with Paliscope, they implemented Explore across their organization, enabling their analysts to index vast amounts of raw data.
With Explore fully operational within their organization, they could visualize all of the collected data and pull key pieces of information and intelligence concerning potential disinformation actors.
More significantly, they could connect dots between various individuals involved in spreading disinformation through instant messaging applications – this was achieved exclusively through Explore’s own Chat Analytics feature.
Overall, our journey with Paliscope has led to our team establishing a more collaborative working environment capable of reacting efficiently and effectively to threat actors associated with hostile foreign intelligence services. Not only do we work faster, but we are capable of securely collecting, processing, and disseminating intelligence to senior decision-makers and commanders.”
Equipped with Paliscope Build, their team was now able to work collaboratively by using its built-in forensic browser to securely capture instances of disinformation being spread across social media.
They then used Build’s integration with Explore to cross-reference their data with Explore. At the same time, they had the capability to securely use Build’s built-in Tor browser to collect information of intelligence value and build a comprehensive target pack concerning disinformation actors.
Their new and streamlined workflows had a noticeable effect on their case officers and tactical units – overall, they saw a 34% increase in the number of successful interdictions and arrests. Moreover, the forensic capabilities of Build contributed to a noticeable increase in prosecutions of high-profile criminals.
No need to worry about evidence documentation and report formatting. Paliscope Build automates all that - keeping your cases structured, secure and easy to hand over.
Find what you are looking for with Paliscope Explore - enabling analysts and investigators to triage large amounts of data and deep dive into the findings.
Process all your data in one place, collaborate across teams, search for anything, and more.