Babel Street Global Threat Monitoring Tool Examined

Author: Brian Karas, Published on Jul 27, 2017

Intelligence on potential threats and terrorist attacks can often be found online hours, or days, before an actual event, particularly in obscure chat rooms or areas of the "dark web". However, mining information from these sources is resource intensive, and challenging given the number of languages that can be involved when dealing with global sites. One company, Babel Street, claims to address this problem, with an advanced linguistic parsing engine processing feeds from hundreds of information sources.

Babel Street's founder and CEO met with IPVM at the NCS4 conference, where their product won a "Golden Eagle" award, to provide details on his company, and their approach to processing big data feeds to generate alerts of potential security threats. In this report we analyze Babel Street's platform and applications in the security industry.

************ ** ********* ******* *** ********* ******* *** ***** ** found ****** *****, ** ****, ****** ** ****** *****, ************ in ******* **** ***** ** ***** ** *** "**** ***". However, ****** *********** **** ***** ******* ** ******** *********, *** challenging ***** *** ****** ** ********* **** *** ** ******** when ******* **** ****** *****. *** *******, ***** ******, ****** to ******* **** *******, **** ** ******** ********** ******* ****** processing ***** **** ******** ** *********** *******.

***** ******'* ******* *** *** *** **** **** ** ******* **********, ***** ***** ******* *** * "****** *****" *****, ** ******* ******* ** *** *******, *** ***** ******** to ********** *** **** ***** ** ******** ****** ** ********* security *******. ** **** ****** ** ******* ***** ******'* ******** and ************ ** *** ******** ********.

[***************]

Babel ****** ******* ********

*** ******* *** ******* ** **** ** ** ***** ************ officer**** *******. ***** ****** *** ****** ~$** ** ******* *******, *** has ****** **** ****-********** ***********. ******* *** *********, ~*/* ** engineering, **** *** ** ***** ******, **. ******.

*** ********* ***** ***** * ****-***** ******** ** *** ***** Street ********* **********:

Product ********

***** ******'* **** ******* ** ******** **** ** ******** ******* of ****** ******. ***** ******** *** **** ********* ** ***** multiple ********* (****** ***+) ** **** *** **** *** *****, but **** **** ** ********* ** ***** ** ****** ***** platforms *** **** *******. *** ****** ** ************ ******* ** a ****** ** ** ********* *** ******* **** *** **** requested ** *********, ***** ** *** ********** ****** ***** ***** or ******** **** ** **** ******** ** ***** *********. **** like ****** ******, ***** *** ******* *** *****, *******, ** indicators ** ******** ** ******** ****** ** ********, *** **** receive ****** **** ***** ******** *** ***.

Sources *********

***** ****** ***** *** ********* **** ******* ** ******** ** those **** ********* *** ***** *** ********* **** ****:

  • *********
  • ***
  • ********
  • *********
  • ********
  • *******
  • **** ****** *******

************, *** ******* *** ******* *** **** *****, ** **** as "**** ***" **** ****** **** ** "****** *******" *** "Intel ********".

**** **** ****** ******, ***** *** ******* *** *****, *******, or ********** ** ******** ** ******** ****** ** ********, *** then ******* ****** **** ***** ******** *** ***.

** ******** ** ****** ******, ***** ****** **** ***** ****** is **** **** ****, *** *** **** ***** ***** ** search ********* ******* ** ***-****** *******. ************, ***** ****** **** translate * ****'* ******* ** ** ******* ** * ****** such ** "********* ******" **** ******** ********* *************, ******** ******* or ******* ** ******* ************* ** ******* *** **** *******. Users *** **** ******* ***-***********, **** ** ** *** ****** only **** *** **** ********** ****** * * **** ****** of ***** ********.

***** ******* *** ****** ****** **** ***** ******'* ****** ** a *****-***** **, ***** *** **** ***-******** ** ***** *** original ****/*****/***** ********** ****, ******** ******, ** ******* *****. *** software *** **** ***** * ********* ***** ** *** **** driving *** *****, ********** *** ******** ** ******** ** ********** the **** ** *** **** ** **.

***** ****** **** **** **** ** *** **** **** *** feeds ** ********, ******** ***** ** ****** ********* ** *** other **** **** *** **** **** ********** ****** ** *** or **** ******* ****** *** ****** **** **** ********* ** alert. **** *** **** ******** ******** ********** ***** ****** *** locations ** ******** ******* ** ** **** ***** ***** ** text *******.

Target *****

********* ** ***** ******'* ***, ****** ***** *** ********* ****** organizations, ********* **************, ************, *******/************** *********, *** ******* *** **** companies. ******* *** ******** ** ******** ** **** ****-**** ******, users **** ********* **** ****-**** ********* ******** ********* *** *** take ******* ** ****** ********.

Limited ************

***** ****** *** ** ********** ** **** ****** **** ***** security *********, ******* *** **** **** ********* *** ***** ********* has ** ** ******** ** ***** ******'* *** *********. *** CEO **** **** ** *** ** ************ ** *** ***** data **** ***** ******* *** ******* **** ******* ** ************ that ******* ******* ** ***** *********.

*****

******* ****** ** ~$*,***/**. *** *** ***** ** ** ********* of ******* *** *****. ******* ** ********* *** ** * factor ** *** ****** ** ****** * **** ***** ** specify, *** *** ****** ** ****/**** ******* **** **** ** monitor.

Competitors ** ***** ******

********** ******* ** ***** ******, ****** **** ** ** ******* to ******* ***** ****. ***** ******** **** ******* ****** ******** platforms, **** ********* ********, **** ** ***** **** ** ******** ** ******/******* *****, and ***** **** *********** *** *********** ****** ****** ** *** text ** *****. *** ******* ** *** **** ****** *** security, ******* ** ********/********* ********, ** * **** ****** *****, and **** *********** *** ****** ** ****** ** (** **) the ***** *********** ******* *****.

** **** *** *** ****** *** ** ***** *********, ** cannot **** *** ****** ***** ******** ***********.

Comments (1)

***** ****** *** *** ** *** ***** ********* **** **** **** *** * **** *******.

** *** ** *** *** ** * ***** ******* (* do *** ****) *** *** ******* ****** ***** **:

  • *** ******* ** ********* *** **** ****.
  • *** ********************* **** ****** ***********. ** ***** * ********** **** * total ** ** **********. ** ** **** ** ********** **** they ** ** *** **** ** ** ** **** ** includes.
  • ***** ** ** *********** ** *** *** ********** **, ** or *** **** *** *********. **** ** ********* ** ********* credibility. ** **** **** ****:

  • ***** ** ** **** **** ** ***** ******* ** **** any ********** **** **** ** ** ****** ******* ** **** they *** ****** ******** ** ***** ** ********.
  • ************** ******* ******* *** **** *** ******* ** ******** *** ** use ***** ********. *******,***** ******* *********** *** **** * ***** **** ****** * ***** ***.

* ***** ****** **** ** * *** ** ******* ****** to ***** ********* *** ****** * *** ******* ******* ********** and ***** ** ****** *** ***** ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Monitoring

IBM / Genetec Surveillance System Investigated Over Philippines Human Rights Abuses on Mar 22, 2019
A lengthy investigation into an IBM video surveillance project in the Philippines, raising concerns IBM helped local police conduct a bloody...
Large Hospital Security End User Interview on Mar 21, 2019
This large single-state healthcare system consists of many hospitals, and hundreds of health parks, private practices, urgent care facilities, and...
Silicon Valley Cybersecurity Insurance Startup Coalition Profile on Mar 20, 2019
Many industry people believe cybersecurity insurance is not worth it, as the voting and debate in our Cybersecurity Insurance For Security...
Top Metrics For Ensuring Integrator Profitability - Statistics on Mar 20, 2019
How do integrators ensure the profitability of their projects? As part of our profitability study, 100+ integrators answered the following...
Genetec Security Center 5.8 Tested on Mar 19, 2019
Genetec has released Version 5.8. This comes after a wait of more than a year that caused frustrations for many Genetec partners. Our previous...
Large US University End-User Video Surveillance Interview on Mar 18, 2019
Schools have become targets in modern days of active shooters and terrorist fears. The need for video and access security is high. Universities...
City Physical Security Manager Interview on Mar 14, 2019
This physical security pro is the Physical Security Manager for the City of Calgary. He is a criminologist by training with an ASIS CPP credential....
Church Technology Director Security Interview on Mar 07, 2019
With 40+ years of experience in IT from a wide array of verticals, including US and foreign military, and large corporate and industrial settings,...
Verified Response Discontinued in Silicon Valley San Jose on Feb 28, 2019
Almost all security alarms are false. This has driven some municipalities to require verified response before dispatching police. However, now San...
Police Department Surveillance Manager Interview on Feb 28, 2019
Former Memphis PD Surveillance Manager, Lt. Joseph Patty retired months ago, but kept busy during his decades on the force, working to build up...

Most Recent Industry Reports

IBM / Genetec Surveillance System Investigated Over Philippines Human Rights Abuses on Mar 22, 2019
A lengthy investigation into an IBM video surveillance project in the Philippines, raising concerns IBM helped local police conduct a bloody...
Eagle Eye Favorability Results 2019 on Mar 21, 2019
Eagle Eye has been the biggest spender in the cloud VMS market including (via their owner) acquiring Brivo for $50 million and CameraManager from...
Large Hospital Security End User Interview on Mar 21, 2019
This large single-state healthcare system consists of many hospitals, and hundreds of health parks, private practices, urgent care facilities, and...
Silicon Valley Cybersecurity Insurance Startup Coalition Profile on Mar 20, 2019
Many industry people believe cybersecurity insurance is not worth it, as the voting and debate in our Cybersecurity Insurance For Security...
Covert IP Camera Shootout - Axis, Hanwha, Hikvision, March, Vivotek on Mar 20, 2019
Covert cameras were one of the last holdout areas for analog cameras. However, in the past few years, IP / HD covert cameras have become...
Top Metrics For Ensuring Integrator Profitability - Statistics on Mar 20, 2019
How do integrators ensure the profitability of their projects? As part of our profitability study, 100+ integrators answered the following...
Avigilon Launches 'Renewed Products Program' on Mar 19, 2019
There are lots of 'pre-owned' cars but pre-owned IP cameras? While such programs are common in other industries, in video surveillance, they are...
Genetec Security Center 5.8 Tested on Mar 19, 2019
Genetec has released Version 5.8. This comes after a wait of more than a year that caused frustrations for many Genetec partners. Our previous...
Retired Mercury President Returns As Open Options President on Mar 18, 2019
Open Options experienced major changes in 2018, including being acquired by ACRE and losing its President and General Manager, John Berman who...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact