The same technology platform used by the CIA against ‘The War on Terror’ since 2007 is the
software gifted to non-profits tasked with fighting child pornography and trafficking. Thorn,
ICMEC and NMEC are supported by Palantir Technologies software platform customized to
their needs. Additional special software add-ons integrate with the Palantir software for custom
Palantir Technologies Platform: What can Palantir do?
Palantir can combine data from multiple sources in order to detect an anomaly or a suspicious
incident. When Palantir gives a demo to potential clients, they use the example of a foreign
national named Mike Fikri:
Fikri purchased a one-way plane ticket from Cairo to Miami, where he rented a condo. Over the
previous few weeks, he’d made a number of large withdrawals from a Russian bank account and
placed repeated calls to a few people in Syria. More recently, he rented a truck, drove to
Orlando, and visited Walt Disney World by himself. As numerous security videos indicate, he
did not frolic at the happiest place on earth. He spent his day taking pictures of crowded plazas
and gate areas.
As the CIA analyst starts poking around on Fikri’s file inside of Palantir, a story emerges. A
mouse click shows that Fikri has wired money to the people he had been calling in Syria.
Another click brings up CIA field reports on the Syrians and reveals they have been under
investigation for suspicious behavior and meeting together every day over the past two weeks.
Click: The Syrians bought plane tickets to Miami one day after receiving the money from Fikri.
To aid even the dullest analyst, the software brings up a map that has a pulsing red light tracing
the flow of money from Cairo and Syria to Fikri’s Miami condo. That provides local cops with
the last piece of information they need to move in on their prey before he strikes.”
Who Uses Palantir?
Other clients as of 2013 included DHS, NSA, FBI, CDC, the Marine Corps, the Air Force,
Special Operations Command, West Point, the Joint IED-defeat organization and Allies.
...The U.S. spy agencies also employed Palantir to connect databases
across departments. Before this, most of the databases used by the CIA and FBI were siloed,
forcing users to search each database individually. Now everything is linked together using
How can Palantir be Applied?
Our products have been deployed to integrate massive volumes of data to support crisis response operations on a moment’s notice. We’ve integrated publicly available data, damage assessments, satellite imagery, weather reports, geospatial information on key infrastructure and relief resources, as well as reports from news agencies and governments, and made it all available in a unified environment for users to search, analyze, and explore.
Palantir makes it easy to combine multiple disparate data sources; source data ranging from
spreadsheets to databases to streaming videos. They, or their partners, create user friendly
interfaces and their analysts construct algorithms based on client needs. Palantir can discover
connections or patterns that analysts miss because it has access to many sets of data at once.
Pertinent data is presented and anomalies are highlighted for analysts to then evaluate.
Palantir’s Predictive Capabilities
Palantir also has another feature that is not as well known, and that is creating mathematical
models and combining these models in relationship to form predictive models. Using MATLAB
software to construct models, Palantir can predict trends, behaviors and probabilities on anything
for which it has raw data and expertise to define rules or behaviors.
Add-on Software Capabilities
Non-profits charged with combatting child sexual exploitation employ additional software
capabilities on top of the Palantir platform.
Griffeye Face-Recognition Software
Griffeye Analyze DI, which was previously known as NetClean Analyze DI “is a platform that
supports digital media investigations and streamlines the process of reviewing images.”
Griffeye Anaylze enables clients to “Manage, build and share digital media intelligence” and is
“The worlds’s premier platform for accumulating knowledge and building intelligence.”
Griffeye Analyze CS Enterprise provides a reference library to help you and your organisation
accumulate knowledge and build intelligence over time.” Further, Griffeye accommodates Facial recognition and object
matching modules, particularly Microsoft PhotoDNA.
PhotoDNA computes hash values of images, video and audio files to identify alike images. The hash is resistant to alterations in the image such as resizing and color alterations. Microsoft donated the technology to the National Center for Exploited and missing children and to Project Vic, which is managed by the Centre for Missing and Exploited Children (ICMEC).
The hash creates a kind of fingerprint that can uniquely identify the image and be used to store and quickly retrieve it.
Also the hash identifiers allow law enforcement to rule out digital materials which have already been identified and processed.
Social Media Data and Interception
To this software colossus, Thorn Digital Data adds the data collections and interception capabilities provided by these social sharing and search platforms: Facebook, Google, Twitter, Imgur, tumbler, Dropbox and Yahoo.
screenshot Thorn partners
To summarize the capabilities provided by these combined software platforms:
1. Facial Recognition of adults and children in photos and videos
2. Tag images and videos with identifying hash
3. Quickly store and retrieve photos and videos
4. Huge cloud storage of photos and videos retaining data over years
5. Track specific individuals or groups anywhere in the world
6. Ability to incorporate intelligence and law enforcement databases
7. Assemble scenarios and predict outcomes
8. Access to social share data including photos and relationships plus algorithms to mine
9. Ability to limit access to system based on role