Tailored Services

Why Counter Terrorism?

Terrorism results in an average of 26.000 deaths per year, threatens institutions, democracy, and human rights globally, and causes significant political and economic instability.

  • Terrorism cost the global economy $855 billion between 2000 and 2018.

  • EU member states lost an estimated €180 billion in GDP due to terrorism between 2004 and 2016.

  • By 2019 the War on Terror had cost an estimated $8 trillion and caused 900,000 deaths.

  • Under the EU Digital Services Act, tech companies that fail to remove terrorist content may be fined up to 4% of annual revenue.

  • Products, destinations, and services associated with terrorism face significant operational, reputational, and legal risks.

  • Terrorists and Violent Extremists are using more advanced tech than ever, to spread their message, recruit, coordinate, and orchestrate attacks.

We prevent terrorism in order to save lives, reduce harm, and build healthier economic environments for our clients to operate in.

Our Services

Actionable Intelligence

The threat of terrorist and violent extremist actors is not static, nor should policy responses be.

Through our investigations of extremist communities, we produce insights and case studies showcasing extremist influence networks' networked cross- and off-platform impact.

Our continuous support has contributed to our clients developing new policies and strategies that have directly contributed to dismantling extensive online networks of extremist actors inspiring offline violence.

Our investigations team provides actionable insights and intelligence reports based on investigations utilizing cutting-edge technology-enhanced analysis of online content and behaviors. By building on our efforts to map offline incidents of violent extremism, we can connect online behavior to offline violent extremist incidents.

We build on a behavior-based model for understanding and analyzing violence-inducing conspiratorial networks and extremist actors. This model helps facilitate strategic network disruption and enables us to monitor the evolution of extremist threats more effectively. Alongside this, it also allows us to remain ideologically and geographically agnostic, giving us the flexibility to monitor extremist actors across ideologies, national borders, and regions.

Our extended network-based mapping goes beyond monitoring events and offline threats. This enables us to connect online activity to specific events and extended networks of extremist actors and activities online and offline. This forms the foundation for a more comprehensive approach to intelligence gathering, increasing the understanding of the behavior within decentralized, seemingly amorphous networks, and in turn, a more accurate assessment of the threat landscape - a useful asset in keeping our clients safe.

  • Sometimes it can be hard to know where to begin - especially when it comes to tackling security challenges tied to violent extremism and terorism. Thankfully our team has decades worth of experience working closely with policy-makers, and with private sector teams to develop comprehensive policies, strategies and plans of action to prevent violent extremism and terrorism, and to limit the harmful impact of bad actors on communities, services and companies. Reach out to learn more about how we set you up for the best possible start to maintain safety for yourself, your company and your users.

  • We offer comprehensive Policy and Strategy reviews and audits to ensure you have the best possible starting point for addressing the potential abuses of your services by extremist and terrorist actors through internal tools, processes, and policies.

  • Applying our teams’ deep knowledge of extremist behaviors, we conduct red-teaming and tabletop exercises to identify and help address potential weak spots in your policy frameworks, safety pipelines, and strategies for mitigating harm, giving you the power to mitigate the risks facing your company, services and clidents.

Capacity Development

As we develop on our journey and learn about user behaviors and the ever-changing dynamics of violent extremist networks, we stand ready to work with your teams to develop and disseminate knowledge and learning resources among relevant stakeholders within your company. This can be done by developing learning resources and training materials tailored to meet your teams' needs and bringing them up to speed on the best practices in taking action against extremist abuses of your services.

Further, we have experience developing resources accounting for our analysts' and external teams' well-being and mental health in this space.

Contact us to learn more about how we can help grow your team’s capacity to handle the challenges posed by violent extremism and terrorism.

  • The scope of our tailored investigations is developed on a case-by-case basis in close coordination with your internal teams during the term of our agreement to ensure we meet your specific needs as the threat landscape evolves.

    We aim to make the evidence gathered by our investigations team as actionable as possible to stakeholders within your company.

    To that end, the findings of our investigations are presented in actionable intelligence reports, accompanied by briefing calls allowing internal stakeholders to engage with our lead investigators

  • Our reports translate the findings of our extensive and in-depth investigations into accessible and actionable intelligence. These reports typically focus on specific cases or communities of bad actors, and the threats they pose to service-providers.

  • Our threat assessments assist you in understanding the threats posed to your company, infrastructure, VIPs, events and assets. These assessments can be helpful in guiding decision-making processes such as by better understanding the risks involved in investments into new regions or locations and how to mitigate these, or where to best apply extra effort in securing existing assets and infrastructure in the evolving threat landscape.

  • Have you implemented measures to increase your safety? Have you taken action to dismantle extremist networks abusing your services, or to ensure you don‘t become a target? Let us assist in understanding your success.

    Through our thorough understanding of networked behaviors within extremist groups we can assist you in understanding how your actions impact extremist activities.

Policy and Strategy Development

By offering extensive knowledge and experience from the global policy landscape, including from working closely with global tech platforms and companies in developing policy responses to the threat violent extremisms, hate, misinformation, and terrorism pose to their platforms and communities, we at Glitterpill LLC stand ready to support you as you develop frameworks further to address and mitigate the threats posed by terrorism.

Through policy and strategic reviews, tabletop exercises, and red-teaming exercises, our team of experts assists in reviewing existing frameworks and their implementation, discovering how bad actors may undermine existing policies and exploit their weaknesses, and finding paths to mitigating these risks.

We can also assist in the foundational effort of building a comprehensive policy framework and developing the infrastructure to enforce these policies.

Continuous Monitoring

We offer dedicated and general continuous monitoring of regions, communities, and extremist and terroristic narratives to identify and address threats in real-time so our clients can prevent harm.

Continuous monitoring supports clients in understanding and assessing the evolving threat landscape surrounding their priority locations and regions, infrastructure, and assets, in addition to the evolving abuses of platforms, tools, and services by terrorist organizers and those seeking to spread violent extremist narratives.

The findings of our continuous monitoring services are made available and actionable to our clients in real-time through secured messaging and notification systems, as well as through real-time API and dashboard access to our ever-evolving database, giving a comprehensive overview over the evolving threat landscape.

Why Glitterpill?

Companies, governments, and civil society are grappling with the threat of terrorism, the challenges posed by abuse of services, such as the viral spread of terrorist and violent extremist content (TVEC), and the resulting policy and legal implications.

Not only are the human losses devastating - violent extremism also significantly impacts your users, clients, and economies, directly impacting your company.

The unmitigated abuse of services and tools by violent extremist groups poses a significant risk of reputational damage to a company and its brands. This may cause irrevocable damage to the client base surrounding products, tools, and services.

The abuse of these services could also lead to legal challenges and liability with severe financial consequences, not only through the loss of customers, but also due to legal action, rooted in regulations such as The EU Regulation on addressing the dissemination of terrorist content online (TCO-Regulation), the Digital Services Act, and a growing array of similar legislation and regulation globally.

The challenge of addressing the threat of violent extremist and terrorist actors grows ever more complex.

In recent years, we have seen a drastic increase in threats posed by politically motivated, post-organizational terrorism and violent extremism.

The year 2019 saw a 320% increase in far-right terrorism. These threats are often rooted in conspiracy theories and dis- and misinformation that proliferate online, as well as more overtly malicious campaigns by bad actors.

The recent trends in the threat landscape add to an increasingly complex, nebulous environment of extremist narratives that intertwine with the global mis- and disinformation landscape, including deliberate campaigns to influence policy and undermine and disrupt our public institutions established to ensure national sovereignty, such as democratic elections.

Our unique behavior-based and data-driven model for understanding and analyzing extremist networks tackles the increasingly complex threats more effectively than previous models. This helps us and our clients facilitate strategic network disruption, enables us to monitor and assess the evolution of the broader extremist landscape and threats more accurately, and keeps our clients safe.

How We Help

Our world-leading intelligence team, in tandem with our cutting-edge tech and comprehensive database tailored to analyzing extremist networks and behaviors support companies in protecting themselves, their customers and their communities from terrorism.

Our extensive expertise in engaging with violent extremists and our global efforts to monitor and analyze influence networks and extremist narratives have helped inform efforts ranging from grassroots-level community resilience efforts to developing international and actionable policy at the UN and EU levels.

Our analysis has contributed to more effective policy and enforcement strategies within some of the world's largest companies.

Having worked in advisory and consulting capacities with central corporate and governmental stakeholders around the globe, Glitterpill LLC’s team is uniquely suited to develop globally applicable, and comprehensive strategic and policy responses to the ever-evolving threat of terrorism.

Our investigations team provides actionable insights and intelligence, combining analysis of signals and behaviors in novel ways. By building on our extensive capacity to map offline incidents of violent extremism, we have developed the capacity to tie online behavior to offline violent extremist incidents.

This has assisted clients in dismantling entire networks of extremist actors and keeping communities and companies safe.

The Glitterpill Process

Our process and services are developed to ensure you can remain focused on your core mission and services while we keep you and your users safe. This approach allows you to do more with less, saving significant costs associated with developing internal capacities from scratch, while benefiting from a more comprehensive understanding of developing threats, and trends across the entirety of the threat assessment and counterterrorism sector.

  • Every company and client is unique and faces unique threats and challenges. To ensure the best possible service, we work closely with our clients to develop tailored packages to meet their needs. By developing a tailored package consisting of intelligence services and threat monitoring, policy development, and data access, we ensure you gain insights covering both the behavior and threats posed by extremists, and the broader context and landscape needed to mitigate long-term risks strategically.

    Our packages are developed as a framework agreement between Glitterpill and our clients, ensuring the flexibility to address emerging threats and issues uncovered throughout our investigations and continuously monitor the evolving threat landscape. Through continuous coordination with our clients, we thus more narrowly define the specific areas of focus for investigations in response to findings, and the evolving needs of our clients.

  • To ensure deliverables of the highest quality and relevance, our team leads stay in close connection with our points of contact within client organizations. This allows us to tailor every deliverable to meet the most pressing needs of our clients. As our investigations and research evolve, we keep our clients up-to-date to ensure we provide advice, insights, and intelligence that is timely and addresses the current and evolving threat landscape in response to the needs of our clients. This also forms the foundation for developing the scope for our research, policy development, and investigation and monitoring efforts.

  • Based on the package and scope of work agreed upon with our client, our team of investigators, data analysts, and technical experts develop a plan of action, breaking each investigation into its key components and research questions requiring examination. Our team then gets to work utilizing every tool available to us, from traditional Open-Source Intelligence (OSINT) methods to advanced data-analytics based on our in-house graph-database and analytics tools to answer the needs of our clients, assess risk and mitigate harm. An integral part of every investigation is the analysis of our finding, translating intelligence to the actionable advice and recommendations to prevent harm you will find at the beginning of every Glitterpill Intelligence Report.

  • In addition to our tailored investigations and analysis we offer continuous monitoring of regions, communities and extremist and terroristic narratives. This supports clients in understanding and assessing the evolving threat-landscape surrounding their priority locations and regions, infrastructure and assets, in addition to the evolving abuses of platforms tools and services by terrorist organizers and those seeking to spread violent extremist narratives.

  • All Glitterpill LLC deliverables go through rigorous quality assurance processes to ensure the quality of our products, the accuracy of information gathered, and the rigor applied in investigation and analysis process to bring you the best intelligence, analysis, recommendations and suggested actions to stay safe.

  • We deliver our findings in reports, briefing calls and through direct data-sharing as agreed upon with our clients, tailoring our deliverables to meet your needs, and integrate as seamlessly as possible with internal systems and processes to take our intelligence into action to keep you and your clients safe.

What sets Glitterpill apart

The safety of our clients, their customers, and communities requires attention and efficiency. With our global reach, internal resources, technology, and expertise we have the unique capacity to assist you in facing the the ever-changing and evolving nature of the threat of extremism.

Glitterpill has the expertise and the means to assess and combat the threat effectively and efficiently. Where others are guided by political interest, our independence gives us the flexibility to apply a global perspective to the threat landscape, to move swiftly, adopt the best technology, hire the best team members from across the globe with valuable experience and perspectives, and focus our efforts where we can have the greatest impact for our clients and humanity.

Extremists operate in nebulous networks. Our approach captures the complexities of extremist behaviors by taking advantage of our global network of analysts, our graph-based data, and AI.

Through our revolutionary global and inclusive approach, studying extremist behaviors across regions, languages, platforms, and cultures - by embedding diversity as the bedrock upon which we’ve built Glitterpill, we reduce the risk of strategic blind spots.

    • Our definition of violent extremism as the violent denial of diversity allows us to analyze global threats more comprehensively without the bias embedded in traditional definitions.

    • As an independent company, we can conduct open-source investigations across various communities, regions, and ideologies, breaking barriers faced by traditional agencies or in-house intel teams at companies.

    • Instead of focusing on individual pieces of evidence our multi-dimensional philosophy and tooling allow us to view the bigger picture, placing signals in context of networked behaviour, giving us the unique power to account of context.

    • By analyzing both online and offline behavior, we better understand and mitigate risks before offline harm occur.

    • Instead of only identifying risks our team of experts assists our clients in developing preventative measures, policy instruments, and effective tools, empowering them to take action to prevent harm.

    • By giving clients direct access to relevant data and proprietary tools for analysis, we allow them to better understand the risks they face and empower them to utilize their unique knowledge of their company and products to reduce risk.

    • Our unique focus on terrorism and violent extremism allows us to integrate our intelligence services with broader security and safety teams providing a flexible solution to address specific threat scenarios.

    • Our unique data model, in tandem with our investigative capacity, allows us to understand the threat landscape in a novel way, offering increased precision and powerful real-time risk assessment capabilities.

    • Our complex analysis relies on human insights enhanced by behavioral data and AI tools for evaluating risks.

    • Enhancing human capacity through tech allows the transparency to understand the complex nature of threats while continuously monitoring for emerging threats in near-real-time at scale.