0% found this document useful (0 votes)
436 views3 pages

Shadow Nexus - Cap Sheet White Paper

Shadow Nexus is a self-funded company focused on providing dark web intelligence data to national security organizations, leveraging unique access to hard-to-obtain data sources. They employ both manual and automated methods to collect and validate data, ensuring it is searchable and tailored to client needs. Their offerings include historical movement tracking, automated targeting, and custom dataset creation, along with an API for data access and analytics.

Uploaded by

brassbrian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
436 views3 pages

Shadow Nexus - Cap Sheet White Paper

Shadow Nexus is a self-funded company focused on providing dark web intelligence data to national security organizations, leveraging unique access to hard-to-obtain data sources. They employ both manual and automated methods to collect and validate data, ensuring it is searchable and tailored to client needs. Their offerings include historical movement tracking, automated targeting, and custom dataset creation, along with an API for data access and analytics.

Uploaded by

brassbrian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

About Shadow Nexus.

Shadow Nexus is a small, self-funded company whose mission is to provide dark


web foreign adversary intelligence data to national security organizations. We have an existing solution
with direct access to private, unique, and hard to get deep, and dark web intelligence data.

Why Shadow Nexus? Our Data. Unique to Shadow Nexus is our access to specific data sets and data
sources. Our reach into the Dark Web to gather hidden published content provides us access unparallel to
other data harvesters. This content is vetted and ensured authentic before being incorporated into
analytical reports.

Shadow Nexus utilizes a dual process to harvest content, manual and automated. We employ a vast
network of automated scrapers that collect data directly from private sources, open and closed-access
forums, and our own massive honeypot networks with millions of monthly active users. We add new data
sets and sources daily and can tailor / target data collection to meet sponsor requirements.

Shadow Nexus does not collect or store any data on U.S. citizens.

Complete Data Collection and Processing. Our core focus at Shadow Nexus is to locate, collect, and
process data which is searchable in a format suitable for various platforms. For example, when Alfa-
Bank, the largest private bank in Russia had private data published on the Dark Web, most companies
were limited in provider alerts and basic metadata details on that collection of data. Shadow Nexus’
processing of the data allows users to search well beyond metadata, such as the bank’s user records,
specific account numbers, and transaction histories.

Data Validation and Synthesis. More than just being able to collect the data, we employ our own
methods for manual and AI-based data validation. Once data has passed our validation process, it needs
to be standardized to make it searchable. Since each piece of information we collect is often in its own
proprietary format, we have developed our own tools and processes to standardize the data so each field
in the database is properly mapped and searchable via our API or UI.
DATA APPLICATIONS

1. Access to confidential, private, and closed source data. Our dark web specialists use active and
passive collection techniques to gain access to private and closed-source data and communications
channels scattered throughout various networks. This allows us early insight into activities and direct
access to private communication channels.

2. Historical Movement Tracking, Predictive Pattern Analysis. Data from sources such as airline
travel records, border databases, and customs import/export databases, can be used to track
historical movements of people and products, and even used to generate ML-based prediction of
future movements. For example, “Show me a list of all containers imported or exported between
Russia and North Korea in 2023”.

3. Automated Targeting. Shadow Nexus uses ML-based techniques to develop to automate targeting
and tracking of individuals or groups. Starting with a single initial record we can build a complete
analysis of a person’s history to include fields like passwords, business registrations, crypto wallets,
flight records, and associated patents.

4. Photo Gathering. Utilizing the


connections made from our automated
targeted algorithms, Shadow Nexus can
also directly access photos for
individuals, or entire populations.

5. Build Custom Datasets with NLQ. Using


our custom query builder, a user can
create their own custom data sets using
Natural Language Queries. For example,
“Show me a list of citizens that traveled
to China from North Korea in 2023”,
would generate a list of anyone that
passed through Chinese customs using
North Korean passport.

6. Indicators and Warning Notifications.


Shadow Nexus provides access to indicators and early warning detection on active attacks, political,
security, social, economic, and other types of events. Our notification tool can be customized to alert
on any specific keywords or fields of information. Examples can range from actively tracking the
movements of individual people, to a daily feed of the latest 0-day vulnerability sales.

7. API for Access to Raw Data & Analytics. Shadow Nexus includes a UI and Command Line Interface
(CLI) for customizing the data delivery with an API that can be accessed in a variety of programming
languages. Analytics can be provided using our own native UI or can be fed via API to any other
analytics or data processing application.
DATABASE SAMPLES

Databases from each CO-COM contain information on citizens from most regions. Common fields include
name, address, phone, email, passwords, family information, social media accounts and other PII.

CENTCOM INDOPACOM
Iran China
- Citizens lists - Shanghai National Police database
- Mobile data - Chinese citizens data
- Medical records - Business registrations lists
- Rideshare data (with GPS) - Food delivery data
- Cryptocurrency exchange - Customs border entry/exit records
- VPN Logs (flight and passenger details)
- Telecom & bank accounts
Iraq - Credit blacklist system
- Telecom data - Hotel digital room key service
- Voter database (all citizens)
- Prisoner lists Indonesia
- Citizenship database
Pakistan - Simcard registration data
- Citizens lists - KPU (general elections data)
- Telecom data (mobile, MSISDN, IMSI)
North Korea
Palestine - Citizens and passport numbers
- Ministry of foreign affairs (diplomatic access
system, including photos) Vietnam
- Citizens, medical, social media

EUCOM Other COMs


Russia Chile
- Citizens, social media, mobile - Immigration / refugee applications
- Sirena Airlines (Flight details)
- Federal bailiffs’ system Brazil
- Military Officials list - National taxpayer registry
- Import / Exports customs data - COVID & medical data
- Traffic police data - Voter database
- M9 Telecom (call logs with voice recordings)
- ALFA Bank – (bank transaction records) South America, multiple
- Atlas Bus (bus ticket purchases) - Citizens Database
- Bank transactions, customer records
Turkey
- Telecom data, phone records Nigeria
- Citizens details - Government voter database

Sam ID: LWHRSG6ZSHM9 Email: info@shadownexus.io


Cage Code: 9W3Q6 Web: www.shadownexus.io

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy