5 min readIntelligence & Insights

Fuse Multi-Source Intelligence Data — Pattern-of-Life Anomalies, Link Analysis & Threat Actor Profiles

This solution transforms how defense contractors process unclassified intelligence by instantly connecting the dots across massive open-source datasets. It gives you a high-value, compliant offering to pitch to government clients desperate to speed up their threat profiling and link analysis.

The problem today

75%

of analyst time wasted manually sifting OSINT data

3 weeks

average time to manually build a single threat profile

Marcus Delaney is the intelligence analysis team lead for a 90-person defense contractor in Northern Virginia, supporting an unclassified threat monitoring contract for a federal agency client. He spends at least an hour every evening reviewing what his team didn't get to that day, quietly aware that somewhere in the unconsolidated data pile, there's a connection no one made yet.

01The Problem

·013–4 HRS/SHIFT LOST

Analytical judgment is postponed until half the shift is spent on data retrieval no analyst was hired to do.

·02STALE ACTOR PROFILES

Threat actor resurfacing with new aliases or infrastructure is discovered by accident, never by design.

·03FULL DAY → 30 MIN

Manual link analysis misses non-obvious relationships that a systematic approach surfaces in a fraction of the time.

·04MISSED ANOMALIES

Behavioral shifts that crossed a threshold days ago disappear into data noise with no systematic flag across activity logs.

·052-HR BRIEF CRISIS

Deadline briefs built from five copy-pasted sources ship rushed, inconsistent, and incomplete — visible to the federal client.

·06ENTITY FRAGMENTATION

The same target living under multiple name variants across sources goes unrecognized until significant analyst hours are already spent.

02The Solution

Solution Brief

Fictional portrayal · illustrative

·01today
  • Marcus leads six analysts on a federal threat monitoring contract
  • First half of every shift: pulling feeds, reconciling records, updating stale spreadsheets
  • Two-hour brief requests expose how thin the analytical foundation is
·02the stakes
  • Lost hours mean lost signal — a connection in the data pile no one reached
  • Behavioral deviation that crossed a threshold last Tuesday, never flagged
  • Rushed briefings built on fragments are a reputational liability with the federal client
  • Analytical judgment — the contractor's core value — ships last, if at all
·03what changes
  • OSINT streams ingested and normalized automatically before analysts open laptops
  • Entity records across disparate sources resolved into unified profiles
  • Pattern-of-life anomalies flagged; link analysis rendered in minutes, not a full day
  • $15K–$25K build paired with $2K–$3.5K monthly recurring
  • Structural embedding in data pipelines and analyst workflows produces high-retention, high-margin ARR
·04field note
My analysts are good. Really good. But for the first three hours every day, they were basically doing data entry. We were paying for judgment and getting clerical work. The worst part is I knew we were missing things — I just couldn't prove it until after the fact.

Marcus Delaney is the intelligence analysis team lead for a 90-person defense contractor in Northern Virginia, supporting an unclassified threat monitoring contract for a federal agency client

03What the AI Actually Does

Multi-Source OSINT Fusion Engine

Continuously ingests and normalizes data from commercial databases, news feeds, social platforms, court records, and other open sources into a single unified data environment — eliminating the manual collection cycle that consumes analysts' mornings.

Pattern-of-Life Anomaly Detector

Establishes behavioral baselines for tracked entities over time and automatically surfaces deviations — changes in location patterns, communication behavior, financial activity, or online presence — before analysts would catch them manually.

Entity Link Analysis Graph

Automatically maps relationships between persons, organizations, locations, and events across all ingested data sources, surfacing non-obvious connections and visualizing threat networks in tools like Maltego or Palantir Gotham.

Threat Actor Profile Generator

Builds and continuously maintains structured threat actor profiles — TTPs, aliases, infrastructure, affiliations, historical activity — drawing on fused OSINT so that when leadership needs a briefing, a current, sourced profile already exists.

04Technology Stack

Microsoft Azure OpenAI Service (Azure Government) — IL4

GPT-5.4: ~$0.005/1K input, ~$0.015/1K output. Entity extraction from 100-page report: ~$2–$5. Threat actor profile synthesis: ~$5–$15 per profile.

Consumption-based

Microsoft Sentinel (Azure Government)

~$2.46/GB ingested (Azure Government pricing); typical OSINT pipeline: 10–50GB/month = $25–$125/month

Consumption-based (per GB ingested)

Maltego (Entity Link Analysis)

Maltego Enterprise: $5,000–$10,000/seat/year. Government pricing available.

Per-seat annual

Recorded Future Intelligence Cloud (Commercial Threat Intel Feed)

$50,000–$200,000+/year depending on modules and entity count

SaaS annual subscription

Babel Street (OSINT and Social Media Intelligence)

Contact vendor; government pricing available

SaaS annual (government pricing)

Palantir Gotham (Enterprise Intelligence Platform — Optional)

Typically $1M+/year for enterprise deployments; available via DoD enterprise license

Enterprise (government contract)

Microsoft Azure OpenAI Service (Azure Government) — IL4

Warning

For CUI//INTEL environments, Azure OpenAI running in Azure Government at IL4 authorization level is the required platform. Confirm with the client's ISSO that the specific data types being analyzed are within the IL4 boundary. Some intelligence-related CUI categories (e.g., CUI//SP-CTI — Controlled Technical Information for intelligence purposes) may require IL5 — verify before deployment.

Microsoft Sentinel (Azure Government)

Cloud-native SIEM and SOAR platform running in Azure Government. Used as the aggregation layer for multi-source data feeds — ingests OSINT feeds, commercial threat intelligence, social media monitoring data, and structured data exports from other tools. Provides the data lake from which Azure OpenAI analysis is triggered.

Industry-standard open-source intelligence and link analysis platform. Visualizes relationships between persons, organizations, IP addresses, domains, email addresses, phone numbers, and locations. Used by IC contractors, law enforcement, and cybersecurity analysts. Transforms (data queries) connect to OSINT data sources and commercial intelligence feeds. Output is a visual graph showing entity relationships and connection paths.

Note

Maltego's cloud-based transforms route data through Maltego's servers — verify data sensitivity before using cloud transforms. For sensitive CUI, use locally-deployed transforms or the Maltego on-premises deployment.

Recorded Future Intelligence Cloud (Commercial Threat Intel Feed)

Recorded Future aggregates OSINT, dark web, technical threat intelligence, and geopolitical intelligence into structured, machine-readable threat intelligence. Provides APIs for automated ingestion into the Azure Sentinel pipeline. Used for threat actor profile enrichment, indicator of compromise (IOC) data, and vulnerability intelligence. FedRAMP Moderate authorized.

Babel Street (OSINT and Social Media Intelligence)

Government-focused OSINT platform providing real-time multilingual social media monitoring, dark web monitoring, and geospatial intelligence data aggregation. FedRAMP authorized. Used by DHS, DoD, and IC contractors for pattern-of-life analysis and situational awareness. Provides structured API output that feeds into the Azure Sentinel aggregation layer.

Palantir Gotham (Enterprise Intelligence Platform — Optional)

Enterprise intelligence fusion and analysis platform widely deployed across DoD and IC. If the client already has Palantir Gotham, integrate the Azure OpenAI analysis pipeline as an enrichment layer rather than replacing Palantir. Palantir AIP (AI Platform) also provides FedRAMP High authorized LLM capabilities that can substitute for the Azure OpenAI components described here.

05Alternative Approaches

Palantir AIP for Government (Enterprise Intelligence Platform)

$500K+/year

Palantir AIP (AI Platform) provides FedRAMP High/IL5-authorized AI capabilities integrated with Palantir Gotham and Foundry. For organizations already on the Palantir platform, AIP is the preferred path for AI-assisted intelligence analysis.

Strengths

  • FedRAMP High/IL5-authorized AI capabilities
  • Integrated with Palantir Gotham and Foundry
  • Preferred path for AI-assisted intelligence analysis on the Palantir platform

Tradeoffs

  • $500K+/year enterprise pricing
  • Significant implementation complexity
  • Overkill for organizations not already on Palantir

Best for: Large IC contractors and DoD organizations already in the Palantir ecosystem

AWS GovCloud — Amazon Comprehend + SageMaker + OpenSearch

Varies by usage

AWS GovCloud provides FedRAMP High-authorized alternatives: Amazon Comprehend for entity extraction (NER), SageMaker for custom ML models, and OpenSearch for entity graph storage and search.

Strengths

  • FedRAMP High-authorized
  • Native fit for organizations standardized on AWS GovCloud
  • Comprehensive ML and search tooling available

Tradeoffs

  • Requires more custom ML development than the Azure OpenAI approach
  • SageMaker custom model training is a significant engineering effort vs. prompt-based extraction

Best for: Organizations standardized on AWS GovCloud

On-Premises (Air-Gapped) — For IL5+ or Classified Environments

$200K–$500K+ infrastructure investment

For environments requiring IL5+ or approaching classified data handling, all components must move on-premises: open-source LLM (Llama 3 or Mistral) on GPU servers, Elasticsearch for data storage and search, and Neo4j or NetworkX for graph/link analysis.

Strengths

  • Suitable for IL5+ and classified environments
  • Full data sovereignty and air-gap capability
  • No external data routing

Tradeoffs

  • $200K–$500K+ infrastructure investment
  • Ongoing ML engineering required
  • Significantly lower LLM capability than GPT-5.4

Best for: SCIF-adjacent or classified intelligence analysis environments

Ready to build this?

View the implementation guide →