At HYAS, we take pride in our effort to try to make a positive impact on the world whenever possible. Cybersecurity, of course, is a business, but stopping bad actors helps protect not only people’s livelihoods but also the critical services that we all depend on. It also prevents the profits from these activities from being funneled back into other criminal ventures. That said, we are always inspired by organizations that dedicate themselves to stamping out injustice in the world.
Human trafficking is one of the most horrendous yet tragically overlooked crimes of the modern age. Thankfully, there are charitable organizations like the Anti-Human Trafficking Intelligence Initiative (ATII) that are fighting to put an end to modern slavery by donating time and resources to help investigate cases and work with police to shut down this shadow industry. While boots-on-the-ground arrests by local law enforcement is the ultimate goal, in the digital age, many frontline investigators do their work entirely online. In the case of ATII, this comprises anything from transaction monitoring and block chain forensics to dark web and open source intelligence. Essentially, the charity serves as a hub for various law enforcement groups to be able to access the technology and resources they need to investigate cases.
Unfortunately, the magnitude of the problem is great and encompasses many different distinct criminal enterprises. In addition to the types of trafficking that immediately come to mind, there are many forms of trafficking that receive very little coverage. Take so-called “pig butchering” scams, where enslaved workers are kept in horrific conditions and forced to work in call centers participating in phone-based scams targeted at individuals in wealthier nations.
Most of ATII’s resources come from donated time and technology, including the vital software they use for investigations. Always looking for ways to augment their capabilities, the charity discovered HYAS while researching enhanced intelligence solutions that integrated with Maltego, their existing intelligence platform. Believing in the importance of its mission and commitment to changing the world for the better, HYAS provided ATII with complete access to our advanced threat intelligence solution HYAS Insight.
“Human trafficking is in every city, every state, every country, so don’t think you’re immune to it,“ said Larry Cameron, CISO for ATII. “It happens in plain sight, but you need the data HYAS has to be able to see what’s not in plain sight.”
With HYAS Insight integrated into their toolset, ATII members were able to drastically cut the average time it took to close cases and move away from a time-consuming manual process that involved using WHOIS lookups on IPs and domains. With HYAS Insight, not only was this information readily available and centralized, it also gave investigators access to historical data, a useful tool when bad actors cover their tracks by constantly switching up the domains they use. “We’re a non-profit, so we have like zero budget for software,” said Cameron, “but companies like HYAS help us fill in the gaps.”
HYAS is proud to support organizations like ATII and their work to help create real, meaningful change in the world. When we heard about ATII’s mission, we knew we could help by giving them access to Insight’s powerful investigative abilities. Cameron touts that HYAS Insight, “Saved us weeks of investigation time.” And when it comes to an industry as nefarious as human trafficking, each minute can mean the difference between life and death.
We were glad to be able to assist the ATII with their work, but the applications for HYAS Insight extend far beyond the uses outlined above. A fully featured intelligence platform, HYAS Insight provides networking professionals with access to the information they need to more effectively carry out investigations. Combining our vast and varied data sources with our in-depth knowledge of attacker infrastructure, we are able to use advanced AI to determine the nuanced relationships between datasets to an extent that other platforms simply cannot. With this information at hand, users can pivot from dataset to dataset to uncover and attribute the source of an attack and any related infrastructure.
- Threat Reports
- HYAS Labs
- Threat Intelligence
- DNS Security
- Artificial Intelligence
- DNS Tunneling
- Major Attacks
- flow data