Trust Center

Creating tools that are
transparent and trustworthy.
founders statement@2x
daniel clemens@2x

Daniel Clemens

founder

founder's statement

We believe the lawful use of publicly available information can save lives, reduce crime, and hold accountable those who take advantage of the weak.

We also understand there are concerns about these capabilities — how certain parties might abuse them and whether future advancements like AI could further tip the balance of equity or take away transparency.

We welcome this conversation, and we hope our peers, the public, lawmakers, and our consumers will also join us. It’s our shared responsibility to hold ourselves to a high standard of accountability to the communities that we serve.

founders statement@2x
daniel clemens@2x

Daniel Clemens

founder

founder's statement

We believe the lawful use of publicly available information can save lives, reduce crime, and hold accountable those who take advantage of the weak.

We also understand there are concerns about these capabilities — how certain parties might abuse them and whether future advancements like AI could further tip the balance of equity or take away transparency.

We welcome this conversation, and we hope our peers, the public, lawmakers, and our consumers will also join us. It’s our shared responsibility to hold ourselves to a high standard of accountability to the communities that we serve.

founders statement@2x
daniel clemens@2x

Daniel Clemens

founder

founder's statement

We believe the lawful use of publicly available information can save lives, reduce crime, and hold accountable those who take advantage of the weak.

We also understand there are concerns about these capabilities — how certain parties might abuse them and whether future advancements like AI could further tip the balance of equity or take away transparency.

We welcome this conversation, and we hope our peers, the public, lawmakers, and our consumers will also join us. It’s our shared responsibility to hold ourselves to a high standard of accountability to the communities that we serve.

What is OSINT?

Open Source Intelligence (OSINT) includes the collection and analysis of openly-available data to solve challenges. This could be information from public social media posts and book reviews to company press releases and news articles.

Once collected, analysts can look for patterns and ask questions about the data to learn more about the problem they’re trying to solve, such as the time of day certain malware distributors are most active on social media.

What kind of data do ShadowDragon’s
products use?

Our tools are designed to make the analysis of publicly available data easier, while still relying on human experts to make the decision about what the data means and how it will be used. We built our tools in such a way to prevent their use for “dragnet” surveillance or to uncover private data that isn’t accessible to members of the public.

kindofdata photo@2x
kindofdata photo@2x

What kind of data do ShadowDragon’s
products use?

Our tools are designed to make the analysis of publicly available data easier, while still relying on human experts to make the decision about what the data means and how it will be used. We built our tools in such a way to prevent their use for “dragnet” surveillance or to uncover private data that isn’t accessible to members of the public.

wheredoesdatacomefrom@2x
Where does the data come from?

We believe our tools should only access data lawfully and with respect for individual privacy.

This means all data used in our OSINT platforms comes from sources and websites openly available on the Internet. We do not circumvent any encryption or privacy settings set by individuals using the online services where information is shared, nor does ShadowDragon use any developer-level access to social media platforms.

wheredoesdatacomefrom@2x
Where does the data come from?

We believe our tools should only access data lawfully and with respect for individual privacy.

This means all data used in our OSINT platforms comes from sources and websites openly available on the Internet. We do not circumvent any encryption or privacy settings set by individuals using the online services where information is shared.

product icon SocialNet@2x 1

SocialNet/

SocialNet® gives users the ability to perform searches and data collection from platforms like social media, gaming discussion forums, online product reviews, and other sources where users publicly share information. It does not and cannot access private messages.

product icon OIMonitor@2x 1

Horizon Monitor/

Horizon Monitor performs real time searches against public data sources for key phrases or types of data, like a stolen credit card number. It’s like a Google News alert you might create for updates on a specific topic or type of content. This is useful for security teams tasked with protecting corporate offices, schools, and public buildings from things like active shooter attacks.

product icon MalNet@2x 1

MalNet/

MalNet™ is our malware tracking and correlation tool which gives clients the ability to import malware data from their organization and analyze it against public malware datasets and historical breach data.

We also provide customers with information from select areas of the dark web, Tor, and known hacker discussion and leak sites so that our customers don’t have to venture into these difficult to access and potentially dangerous sites on their own.

Who uses OSINT?

We make our tools, data, and training available to vetted law enforcement, public servants, and corporate organizations who provide protection to their communities — from building cases against organized crime to managing public health crises and physical threats against employees.

For each inquiry we receive from a potential customer, we perform our own due diligence into the legal and human rights landscape of the region and parties involved, including potential use cases. We also pay special attention to the degree of transparency offered by the inquiring party.

We often deny or discontinue licensing requests that we feel may be fraudulent or from an organization likely to abuse it to cause harm to others.

humantrafficking@2x

Human Trafficking

One of our most important obligations is to vulnerable communities. As individuals, and as a company, we give tools and training support to organizations that are fighting human trafficking around the globe. You can read more about that here.

publichealth icon@2x

Public Health

Creative use of OSINT tools is also critical in the battle for public health and equity. Public health professionals can more efficiently deploy lifesaving support to communities experiencing higher or growing rates of abuse by correlating aggregate arrest statistics and community overdose data.

Who uses OSINT?

We make our tools, data, and training available to vetted law enforcement, public servants, and corporate organizations who provide protection to their communities — from building cases against organized crime to managing public health crises and physical threats against employees.

For each inquiry we receive from a potential customer, we perform our own due diligence into the legal and human rights landscape of the region and parties involved, including potential use cases. We also pay special attention to the degree of transparency offered by the inquiring party.

We often deny or discontinue licensing requests that we feel may be fraudulent or from an organization likely to abuse it to cause harm to others.

humantrafficking@2x

Human Trafficking

One of our most important obligations is to vulnerable communities. As individuals, and as a company, we give tools and training support to organizations that are fighting human trafficking around the globe. You can read more about that here.

publichealth icon@2x

Public Health

Creative use of OSINT tools is also critical in the battle for public health and equity. Public health professionals can more efficiently deploy lifesaving support to communities experiencing higher or growing rates of abuse by correlating aggregate arrest statistics and community overdose data.

predictiveandai@2x
What about predictive policing and AI?

We Don’t Believe In “Predictive Policing” Or Trusting Machines To Make These Kinds Of Decisions.

That’s why you won’t find any artificial intelligence or machine learning technology in our products. Our tools merely automate the gathering and presentation of data to the people responsible for making decisions based on applicable moral, ethical, and legal frameworks.

prague earth_1200x
Committed to Data Privacy and Security

Approval of the US-EU Data Privacy Framework.

We are proud to announce our compliance with
the US-EU Data Privacy Framework, a certification achieved and administered by the United States Department of Commerce. This
framework enhances the legal protections for transatlantic data transfers, ensuring that personal data is safeguarded according to European standards.
The framework was adopted by the European
Commission on July 10, 2023, and replaced the EU-US Privacy Shield program.
In addition to our adherence to the US-EU Data Privacy Framework, ShadowDragon has achieved SOC2, Type II compliance. This certification is a testament to our dedication to maintaining robust controls and processes, security, availability, processing integrity, confidentiality, and privacy of customer data. SOC2, Type II
compliance involves rigorous audits and assessments, ensuring that we meet or exceed the industry standards for security, availability, processing integrity, confidentiality, and privacy.

1. Security: Protecting databases and systems from unauthorized access.
2. Availability: Ensuring system operations and services are available for authorized use.
3. Processing Integrity: Protecting the confidentiality, privacy, and security of information processing.
4. Confidentiality: Safeguarding the confidentiality of sensitive information.
5. Privacy: Protecting customer information and preventing data breaches.

Our Privacy Notice

You can access our privacy policy here.

Additionally, we believe in protecting the data that touches our software. All data collected by ShadowDragon® tools is presented only to the requesting user via a private dashboard or API connection and then discarded. Search results and artifacts presented to users are always attributed back to the original source, to reinforce accuracy.

Hindsight is twenty-twenty, but sometimes following your due diligence checklist while performing a risk assessment may protect you or someone downstream.

Not everything is about profit.

Scroll to Top