IntellACT
Selected outcomes

Case Studies

Illustrative, anonymized examples. Full details are shared privately upon qualification.

simulation
operator clustering - anomaly lines - confidence gradients
terrain
campaign terrain - chokepoints - exposure windows
forensics
chain of custody - link evidence - exportable exhibits

Coordinated short attack disrupted — global software company

Challenge: A sudden wave of synchronized posts and “expert” reports drove a sharp sell‑off ahead of earnings.

Approach: Multi‑source collection identified a cross‑platform nucleus of inauthentic nodes. Link analysis surfaced content brokers and funding conduits. Narrative testing produced counter‑options.

Outcome: 63 inauthentic accounts removed; three operator clusters attributed; volatility window reduced by 41% within 10 trading days.

Integrity due diligence under pressure — strategic acquisition

Challenge: Compressed timeline to evaluate integrity and regulatory exposure for a target in a complex jurisdiction.

Approach: Adverse‑media and litigation graph, beneficial‑ownership reconstruction, discreet stakeholder interviews, and sanctions proximity checks.

Outcome: Uncovered concealed related‑party entity and high‑risk counterparties; transaction re‑structured; board received scenario playbook.

Ghost network attribution — synthetic reviews & ratings

Challenge: A consumer platform faced manipulated reviews and rating inflation linked to a rival’s reseller ecosystem.

Approach: Pattern recognition over purchase/feedback timing, wallet clustering, and API traffic anomalies; HUMINT‑supported attribution of operators.

Outcome: 11 reseller hubs exposed; takedown package delivered to platforms; civil action prepared with evidentiary chain.