Cyber Security
Investigations
Capacity Building
Insights
About
Digital Threat Digest Insights Careers Let's talk

Online harms monitoring

Our digital investigators identify and verify digital threat actors before they can exploit a platform’s functionality or audience at scale and cause genuine online and offline harm.

Speak to an expert
Response

By leveraging our human-led, tech-supported investigations, we support Trust & Safety teams and organisations working to disrupt complex online harms. We are long-term trusted partners with global social media platforms, enabling them to transform from reactive to proactive, ensuring a safer user environment.

Using advanced OSINT tooling and technology, we continually scan the horizon to detect, pre-empt, prioritise, and contextualise threats. Our intelligence provides actionable insights, allowing you to make decisions before risks become harms.

Rapid identification of evolving threats

Our digital investigators identify and verify digital threat actors before they can exploit a platform’s functionality or audience at scale and cause genuine online and offline harm. Our approach means that, just like threat actors, we aren’t constrained by the boundaries of individual platforms. Our cross-platform and off-platform approach enables us to detect, map out, and attribute large-scale hostile networks.

We partner with our clients to accelerate responses across the full array of online harms, including:

  • Child safety and child exploitation
  • Organised crime
  • Terrorism, Violent Extremism, and Hate Speech
  • Influence Operations
  • Civic and election integrity
  • Disinformation and misinformation
  • Synthetic content and information integrity
  • Financial and commercial abuse and scams
  • Illegal marketplaces
  • Human trafficking and people smuggling
  • Deceptive and harmful behaviours
Speak to an expert
Placeholder

We focus on far more than just content

Our three-pronged approach (content-behaviour-infrastructure) brings unique and valuable insights into complex adversarial networks, where content alone may not be sufficient for escalation or disruption of violative platform behaviour or threat actor infrastructure.

Our methodology provides our clients with outstanding returns on investment. Moving beyond content moderation serves speed, efficiency, and effectiveness. Our approach allows comprehensive assessment and attribution at scale, allowing significant enforcement outcomes and reducing in-house moderation investigation and workloads.

Building gap

Why work with PGI?

There is no single technological solution that caters for needs across the whole industry; genuinehuman expertise, scaled by technological tools, continues to outperform all other approaches.

Combined with our geopolitical expertise and unrivalled knowledge of online information environments, our approach enables us to accurately assess the scale, severity, and novelty of each threat. We do this on a case-by-case basis to inform evidence-driven prioritisation.

We work globally with clients from the US to APAC, operating in different time zones, using our expansive range of foreign language skills and thematic specialisations and expertise. Since 2019, we have investigated threat activities across 85 geographies in languages spanning A(mharic) to Z(ulu).

Partnering with you to ensure information integrity

Find out how we can help you understand and protect your information environment.

Speak to an expert