Posts by Jason

Finding a Mole: Cyber Counter Intelligence

This video demonstrates the Palantir platform’s cyber analysis capabilities, specifically investigating a notional case of an Embassy employee exfiltrating classified information to an outside organization. This investigation combines network traffic data, routing information, proximity card, or badge swipe events, social network data, and video surveillance to uncover the suspect employee through statistical, temporal, geospatial, and [...]

Continue reading »

International Air Travel Security

After the TSA released details of the new Secure Flight Program, we investigated how Palantir can be used in a border security setting, specifically international air passenger screening.  Palantir is very well suited to this mission because our platform offers: Integration of disparate data sources—such as API, PNR, and DCS data—all in a single analytic [...]

Continue reading »

Unstructured Workflow Training Video

Most of our videos on the Analysis Blog so far focus on the sexiest of Palantir’s analytical capabilities:  novel geospatial analysis, powerful statistical analysis, advanced link analysis, etc… However, many Palantir clients focus heavily on unstructured information: cables, message traffic, operation summaries, patrol reports, law enforcement encounters, key leader engagements, NGO reports, etc.  So how [...]

Continue reading »

Palantir as an Overhead Imagery Platform

One of the areas of Application Programming Interface (or API) expansion in our latest release of Palantir, 2.2, was geospatial layers. These layers empower developers to build novel geospatial analysis tools on top of our Map application. In this video we will show three examples of Map Layers: Heatmap: Visualizes density of geospatial points of [...]

Continue reading »

Preventing and Detecting Fraud, Waste and Abuse using Palantir Government and RDC

Having trouble watching this video? Click here to download in Windows Media format (.wmv). This video demonstrates how open source data from Regulatory Data Corp can be used inside Palantir to find fraud, waste and abuse. In the video we use RDC data alongside federal contract data from USASpending.gov to find suspicious contracts. We find: [...]

Continue reading »

Profiling Somali Piracy

Analysis of Piracy Around the Horn of Africa The recent hostage rescue by US Navy SEALs off the coast of Somalia has focused media attention on the growing threat of piracy to international shipping in the Horn of Africa. We have applied our advanced analysis capabilities to data published by the International Maritime Bureau Piracy [...]

Continue reading »

West Nile Virus Infections in the US 1999-2007

Since 1999, the Centers for Disease Control have published reports for West Nile Virus. Using data through 2007, Palantir has plotted the westward expansion of infections using our Map Application and Palantir Heatmap Helper. The cyclical nature of West Nile and the temporal jumps in the disease pop-out as we discover the local hotspots and [...]

Continue reading »

Congo

With the recent arrest of General Laurent Nkunda, one of the key rebel leaders fighting in the Democratic Republic of Congo, we decided to take a look at an ongoing conflict that has involved armies from across Africa and defied numerous attempts to establish a lasting peace. Our analysis focuses on the complex relationships of [...]

Continue reading »

Infowar Monitor Uncovers GhostNet Cyber Espionage Network

Our friends at the Information Warfare Monitor, a joint initiative between the SecDev Group and the Citizen Lab, have just released findings of a massive suspected cyber espionage network affecting 1,295 computers in 103 countries. From the New York Times article: “This is also believed to be the first time researchers have been able to [...]

Continue reading »

Mortgage Fraud

Mortgage fraud can take many forms, including: Securing multiple loans that exceed the value of the property Selling the same property multiple times to different buyers Dishonest appraisals resulting in inflated home values Schemes profiting from defaults on FHA secured loans Straw buyer schemes to conceal the true borrower from the banks or authorities According [...]

Continue reading »

Showing 21-30 of 34

Blogs