Heimdall Defense
Information Dominance Through Detection
Operational-grade influence detection running 56 span-level techniques, 8 stealth propaganda analyzers, and a 16-pattern narrative flow engine. Detect adversary information operations — including stealth manipulation hiding behind legitimate-looking news sources — with quantified confidence scoring, severity assessment, and emotional arc classification. Content safety stack protects MWR platforms and family readiness sites.
Challenges You Face
Adversary IO
State and non-state actors deploying Coordinated_Messaging, Astroturfing, Victimhood_Narrative, and stealth framing at scale
Force Protection
Personnel targeted by manipulation campaigns using fear escalation, anger buildup, and FOMO techniques
Gray Zone Operations
Information warfare below conflict threshold — stealth techniques that maintain journalistic cover
PSYOP Pattern Analysis
Need to map adversary manipulation choreography: which techniques, in what sequence, targeting what emotions
Stealth Adversary IO
Local media that appears balanced but sources asymmetrically from adversary-aligned actors (perspective_ratio > 0.8)
Military Community Safety
MWR platforms and family sites need content moderation — CSAM detection, grooming prevention, age-appropriate filtering
Key Features
56-Technique IO Detection
Real-time span-level classification of adversary manipulation with per-technique confidence and severity scoring
8 Stealth IO Analyzers
Source balance, quote stacking, framing asymmetry, voice asymmetry, hedging, context omission, implied narrative, passive framing
16 Flow Patterns
Fear escalation, anger buildup, technique accumulation, sympathetic hook, firehose of falsehood, narrative hijacking — mapped per article
6-Arc Emotional Classification
Classify adversary narrative shape into Rags to Riches, Riches to Rags, Man in a Hole, Icarus, Cinderella, or Oedipus
Attribution Confidence Scoring
Per-span confidence from calibrated model + stealth technique fingerprinting for probabilistic source attribution
Multi-Language Pipeline
DeBERTa backbone supports multilingual analysis — extend detection across theater languages
Coalition Dashboard
Shared analysis via API — POST /analyze/full returns all results in structured JSON for integration
Content Safety for MWR
12-plugin content safety stack: CSAM detection, grooming prevention, toxicity, NSFW — 4 moderation tiers
What Others Miss
Stealth manipulation that hides behind objectivity. Heimdall exposes it.
Perspective_ratio analysis on local media — detects outlets that source 80%+ from adversary-aligned actors while appearing balanced
SpaCy NER + VADER: active voice for adversary successes, passive for failures. Voice_asymmetry > 0.2 triggers detection.
Coverage omitting adversary provocations, civilian casualties, or peace offers — statistical/event/causal claim analysis
"Questions are being raised about" — 19 high-doubt patterns (severity 0.5-0.9) distinguish adversary doubt-planting from legitimate journalism
Techniques We Detect
State-sponsored synchronized IO — technique fingerprinting across outlets
Manufactured local opposition — fake grassroots campaigns
Adversary framing as victims — narrative inversion detected at span level
Manufactured atrocity propaganda — fear escalation flow patterns
Nationalist/patriotic manipulation — emotional exploitation of national identity
Pricing
Unit Level
- ✓Tactical deployment
- ✓Local analysis
- ✓Community moderation
- ✓CSAM compliance
Theater
- ✓Multi-domain IO analysis
- ✓Coalition sharing
- ✓Full stealth suite
- ✓Flow patterns
Enterprise
- ✓Global deployment
- ✓Full integration
- ✓12-plugin content safety
- ✓Custom models
Own the Information Environment
Schedule a demo or start your free trial today.