The main Navigation Panel is how you will move around the platform and access the various features you have access to.
The Navigation Panel is located down the left-hand side of your screen at all times. It’s accessible regardless of where you are in the platform, and you will use the Navigation Panel to move from module to module.
Here are some key things to remember:
The Location Search allows you to quickly and easily pinpoint a specific location on the map interface.
The Location Search can be found in the top left-hand corner of the main map interface, which can be accessed through the Intelligence Feed module.
You can use this search functionality to quickly locate an asset, city, town, landmark or region on the map.
There’s also a icon designed to look like a target top the right of the search box, which will appear when you open the Location Search. This allows you to zone in on your current location on the map.
Your browser will first prompt you to share your location. You’ll need to allow these permissions in order to use this feature.
This article will help you understand how to use the Map Key, and when you’ll find it useful.
The Map Key can be accessed in the bottom right-hand corner of the Navigation Panel at all times.
Intelligence Fusion defines incidents using:
The Map Key will therefore provide you with context around the iconography and different colored pins we use to categorize incidents on the map.
In addition to pins on a map, you can visualise the data in other ways – including an Overview Dashboard. Here’s how you can access it.
The Overview Dashboard can be accessed from the main Navigation Panel. It provides you with an alternative way to view elements of the platform including incidents, statistics, watched incidents, and themes.
Turning on and off the incident pins in order to customize your view of the map interface.
Overlays are active when they are highlighted in blue.
Turning on and off your static assets in order to customize your view of the map interface.
Overlays are active when they are highlighted in blue.
You can customize how you visualize incidents on the map by clustering icons, or viewing them individually – here’s how.
Customize your view of the map with a selection of map styles.
There are currently four available map styles that you can switch between, depending on your preference and how you would like to view the data. You can also set a default view for your account.
the map.
You can change the perspective of the map at any time, and on any map style too.
The Incident Filter feature allows you to perform searches on our dataset and identify incidents that are most relevant to your business and operations.
The basic filters consist of the most commonly used filters and are typically used to perform quick, high-level searches of the database. Once you’ve built out some Basic Filters, you can save your search and turn on notifications for the criteria that you’ve set.
Remember, the map will show a maximum of 10,000 incidents at any one time. So if your search criteria exceed this limit, you won’t see all of the incidents available within our dataset.
The Incident Filter feature allows you to perform searches on our dataset and identify incidents that are most relevant to your business and operations.
The Advanced Filter provides you with much more granularity compared to the Basic Filter functionality and is typically where our clients will start to build out specific searches for which they’d like to receive alerts.
Once you’ve narrowed down the Incident Feed using the Advanced Filters, you can save your search and turn on notifications for the criteria that you’ve set.
The Advanced Filter also provides you with the option to “exclude” certain filters from your search. When the toggle to the right of the filtering option is green, this is including that criteria in your search. Clicking on the toggle, it’ll turn white, meaning that it’s being excluded from your search results.
As you filter, the map will start to narrow down the dataset and return results based on your criteria. From here, you can take some additional actions:
Remember, the map will show a maximum of 10,000 incidents at any one time. So if your search criteria exceed this limit, you won’t see all of the incidents available within our dataset.
The Draw Area filter gives you the functionality to geofence around a custom area of interest, allowing for another level of granularity when searching for the incidents that are most impactful to you and your organization.
The Draw Area filter can be found in the Advanced Filter section of the platform.
The Static Asset Search filter allows you to visualize incidents that have occurred within a specified radius of any assets that you have plotted on the map. This article will show you how the “Static Asset Searches” filter can be used to do this.
Firstly, however, you will need to create some Static Asset Searches if you have not already. You can read about how to do that here.
Once you have saved your relevant Static Asset Searches, you can filter for them in the Advanced Filter section of the platform. If you’re yet to explore the Advanced Filter functionality, you can check it out here.
Remember, the map will show a maximum of 10,000 incidents at any one time. So if your search criteria exceed this limit, you won’t see all of the incidents available within our dataset.
Saving filters allows you to turn on notifications for certain criteria. It also provides you with an easy way to activate alternative views and drill down into relevant data quickly.
You can create filters using the Basic or Advanced filtering options in the Incident Filter Panel. If you need some help doing this, you can head to this article.
If you need to make a change to a saved filter, this article will show you the easiest way to do so on the platform.
If you no longer need a saved filter, you can remove it from your Saved panel. Please note that this action cannot be undone.
Our map-based software provides you with a highly-visual way to view and interrogate the data, but there are other ways you can visualize our incidents too.
The default view when you log in to the platform is the map. You can interact with individual incident icons on the map at any time, however, you can also view incidents in a list format. To do this, you’ll need to open the Incident List Panel.
USING SORT
Once clicked, a dropdown box of options will appear. Sort the data in your preferred way; by oldest, newest, by type or even by incidents that are still ongoing.
USING OPTIONS
Options allows you to customize your view further.
Using the Statistics Tool, you can easily generate statistics based on the data you’re currently filtered for on the map. This provides you with a quick and insightful way to understand the most common type of threat.
The Themes tool provides you with a way to visualize trends and patterns within the dataset.
You can view Theme data as individual incident or as a heatmap. You can also turn on notifications for any Themes that you may be interested in following more closely – you can do this in the Advanced Filter panel.
USING FILTER
Filter allows you to drill down into the available themes to help you find what you’re looking for. Click Filter to show a dropdown box of your option.
USING SORT
Once clicked, a dropdown box of options will appear. Sort the data in your preferred way; by oldest, newest, highest or lowest casualty count or even most recently added to.
How to find, use and get the most value out of the Emerging Threats feature.
The Emerging Threats feature is located within the Incidents panel on the left-hand side of the platform, below the Themes icon. This will open a panel on the left-hand side (like the incident list panel), which will showcase all our Emerging Threats.
Our Emerging Threats are situations that our analysts have identified as having a significant probability of materializing into an active threat.
The main benefits of the Emerging Threats feature include:
How to use Emerging Threats?
How to access, use, and get the most value out of the Timeline Tool
The Timeline Tool is a feature available on your subscription, allowing you to visualise trends more easily. The button to access the feature is in the bottom right-hand corner of the map, above the “Map Options” button. The button will ONLY appear when a new filter has been created or a saved filter has been activated. Activating the Timeline Tool will open a panel at the bottom of the map with a bar graph showing the number of incidents per week or month, dependent on the time frame selected in the filter activated. The visualisation can then be viewed in a dynamic motion by clicking the play button.
The main benefits of the Timeline Tool include:
How to use the Timeline Tool:
While you can use the Timeline Tool with a filter that has no time frame, the timeline may not display accurately if you do, as it will reflect the incidents on the map, which have a limit of 10,000 incidents to be displayed at one time.
How use the geolocation form while reporting your own incidents, and understanding the various tools at your disposal.
When reporting an incident, you will get two mapping screens. The information below is how to use each screen.
The first screen you come across is where you will select how and where you will map your incident. This is how the geolocation will look inside an incident’s details. The screen is made up of several components.
The second geolocation screen is to confirm the location of the final incident pin that will appear on the global map where all the incidents show.
The pin on the screen will automatically be placed in the same location where you place the pin on the first geolocation screen, or will be located in the middle of the area or route you drew on the first geolocation screen.
If you need to adjust the location of the pin to reflect what you want better, just click on the pin on the screen and drag it where you’d like it located.
When you are done, you can click the Confirm button at the bottom right-hand corner of the screen.
Customize your platform to include incidents that matter most to your business. This premium feature allows you and your team to report incidents that impact your business, assets and people. This article will explain how incident reporting works.
Our team of expert analysts work 24 hours per day, monitoring the global threat landscape and prioritizing threats that will impact our client’s operations. Clients are alerted of these incidents, which allows them to act swiftly. Thorough Intelligence Collection Plans (ICPs) formulated with customers during the onboarding process and regularly updated throughout their subscription provide our analysts with the information required to understand your needs.
A premium feature of our platform is the ability to report your own incidents.
Another way of reporting your own incident is to ‘Clone’ an existing incident; this can be faster than following the process above. You can do this by following the steps below:
Alternatively, you can right-click anywhere on the map to report an incident. This can make geo-locating an incident easier if you know exactly where it has occurred and prefer to input this information first.
————————————————————————————————–
You can view incidents you report in the same way as you would any other incident. Using the filter panel, you can search in various ways to find them, including using the ‘reported by’ option in advanced filters to quickly see all incidents you or your team have reported.
In addition, alerts can be set up, so your team can be made aware when you report an incident within so many miles of one of your assets.
Using the Export as a PDF tool provides you with a formatted list of incidents that you can utilize offline.
To start, you’ll need to build a new filter using the Basic or Advanced Filters. You can learn how to do this in the Filtering Incidents section of our Knowledge Base.
Alternatively, you can export the data from an existing Saved Filter.
Exporting from new:
From a Saved Filter:
Your export will start to download and will typically be available in a few minutes, depending on the size of the dataset. Please note, the maximum number of incidents you can export at any one time as a PDF is 250.
Exporting from new:
From a Saved Filter:
Your export will start to download and will typically be available in a few minutes, depending on the size of the dataset. Please note, the maximum number of incidents you can export at any one time as a CSV is 1,000.
This article will show you how to easily turn off notifications for new incidents or turn off incident updates from within the platform.
Turn off new incident notifications
To turn the notifications back on, simply use the toggle again to activate the alerts.
If you’ve used the Watch functionality to receive notifications about incident updates and would like to stop receiving alerts, you can un-watch an incident at any time. You can do this in the same way that you Watched an incident.
Make sure that you don’t miss any incidents of interest by setting up alerts using the platform.
Notifications of new incidents are sent via email, to the email address associated with your account. Once notifications are turned on, you will receive alerts of new incidents as soon as they are triggered by the filter criteria you’ve defined.
To set these criteria, you need to create Saved Filters using the Basic or Advanced filters – you can find articles detailing these steps in our Knowledge Base.
We update already reported incidents with new information as and when we receive new intelligence – ensuring you always have the most up-to-date information, and as much context as possible to help you make decisions.
To make sure you’re aware of when an incident is updated or changed, you can use the Watch functionality to ensure you receive a notification when this happens.
You can Watch an incident in several ways:
From the map interface
Click on the icon of the incident you would like to follow. This will open an incident balloon, where you will see four icons. Click the first icon, shaped like an eye, to start following incident updates.
The icons should turn green to indicate that you’re Watching that incident. Any updates or changes we make to that incident including, a change in casualty figures, updated summary, change of incident type, or adding an involved party, you’ll receive a follow-up alert to let you know.
From the Incident List Panel
If you have identified an incident that you’d like to follow in the Incident List Panel, you can simply click the first icon – shaped like an eye – to start receiving incident updates.
If you can’t see any icons in the Incident List Panel, you may be looking at the panel in Compact View. Click the Options tab and make sure that the Compact View option is unchecked.
From an incident profile
If you’re currently in an incident profile and would like to follow any updates or changes that we make to that incident, you can click the three dots in the top right-hand corner of the profile – it sits next to the ‘X’ that closes the profile.
Once clicked, an option will appear to Watch that incident.
You can un-watch an incident at any time, by simply clicking on the option again. Once un-watched, you’ll no longer receive alerts about updates or changes.
How to get notifications for incidents updates
We update already reported incidents with new information as and when we receive new intelligence – ensuring you always have the most up-to-date information, and as much context as possible to help you make decisions.
To make sure you’re aware of when an incident is updated or changed, you can use the Watch functionality to ensure you receive a notification when this happens.
You can Watch an incident in several ways:
From the map interface
Click on the icon of the incident you would like to follow. This will open an incident balloon, where you will see four icons. Click the first icon, shaped like an eye, to start following incident updates.
The icons should turn green to indicate that you’re Watching that incident. Any updates or changes we make to that incident including, a change in casualty figures, updated summary, change of incident type, or adding an involved party, you’ll receive a follow-up alert to let you know.
From the Incident List Panel
If you have identified an incident that you’d like to follow in the Incident List Panel, you can simply click the first icon – shaped like an eye – to start receiving incident updates.
If you can’t see any icons in the Incident List Panel, you may be looking at the panel in Compact View. Click the Options tab and make sure that the Compact View option is unchecked.
From an incident profile
If you’re currently in an incident profile and would like to follow any updates or changes that we make to that incident, you can click the three dots in the top right-hand corner of the profile – it sits next to the ‘X’ that closes the profile.
Once clicked, an option will appear to Watch that incident.
You can un-watch an incident at any time, by simply clicking on the option again. Once un-watched, you’ll no longer receive alerts about updates or changes.
If you have a large number of assets, we recommend that you use the CSV upload functionality to bulk upload your static assets to the platform.
We provide you with a template CSV file that you’ll need to populate with the correct information. The below steps take you through the bulk upload process in detail.
If there are any errors with your CSV, the platform will highlight exactly which row and column contains the error. If you’re experiencing further issues, reach out to your Customer Success Manager for support.
You can manually add assets to the platform too. We suggest this option if you have a small number of assets, or you’re looking to add new assets to your database following an initial bulk upload.
How to add static assets you have a small number of static assets or you would like to add a small number of new assets to your existing database, you can manually plot your assets directly on the map
We recommend reading this article about mapping out your Types and Subtypes data before you begin plotting your static assets.
If you have a large amount of static assets, we’d recommend using the bulk upload feature to add your static asset data to the platform.
Before you can add your static assets to the platform, you need to define the types and subtypes and upload them to the platform.
Assigning types and subtypes to your assets provides better categorization, and therefore makes filtering and setting up notifications for assets much more granular.
Types are mandatory, however, types are optional. If you need advice or recommendations on what your types and subtypes should be, reach out to your Customer Success Manager, who can help you define these and ensure you’re getting maximum value from this feature.
You can manually plot your static assets or you can bulk upload your assets using our CSV template. We have articles in our Knowledge Base explaining each option clearly.
The Static Asset Search filter allows you to visualize incidents that have occurred within a specified radius of any assets that you have plotted on the map.
In this section, you will learn how the “Static Asset Searches” filter can be used to do this.
Firstly, however, you will need to create some Static Asset Searches if you have not already. You can read about how to do that here.
Once you have saved your relevant Static Asset Searches, you can filter for them in the Advanced Filter section of the platform. If you’re yet to explore the Advanced Filter functionality, you can check it out here.
Remember, the map will show a maximum of 10,000 incidents at any one time. So if your search criteria exceed this limit, you won’t see all of the incidents available within our dataset.
Being able to filter using your Static Assets allows you to visualize incidents that have occurred within a specified radius of any assets that you have plotted on the map. Firstly, however, you’ll need to create some Static Asset Searches.
You can save as many Static Asset Searched as you need. Once saved, they will now appear as available options when using the Static Asset Search filter in the Advanced Filter panel.
You can filter by static assets to create alternative views, drill down into relevant incidents and set up notifications.
Before you can filter using your static asset dataset, you will need to create and save Static Asset Searches – you can learn how to do this here.
Once you have saved your relevant Static Asset Searches, you can filter for them in the Advanced Filter section of the platform. If you’re yet to explore the Advanced Filter functionality, you can check it out here.
Remember, the map will show a maximum of 10,000 incidents at any one time. So if your search criteria exceed this limit, you won’t see all of the incidents available within our dataset.
The News Feed augments our Intelligence Feed with raw, unmoderated news from across the globe.
Depending on your subscription, you may not have access to the News Feed. If you’d like to learn more about accessing this feature, you can speak to your Customer Success Manager.
This article will explain the process of setting up a News Feed filter to narrow your search and find the news articles that are most relevant to your organization.
If you have access to the News Feed, it’ll be the second option on your main navigation bar, down the left-hand side of your screen. The icon will look like a newspaper.
If you’d like to edit or amend your saved News Filters, this article will walk you through the simple steps to making changes to your existing filters.
If you’d like to delete one or more of your saved News Filters, this article will walk you through the simple steps to deleting existing filters.
How to access, use and get the most value out of the country profiles feature.
Country profiles are one of our premium features; if you have this included as part of your subscription, you will be able to access it by clicking on the profile selector icon in the right-hand side menu. This will open a sub-menu; you can then select country profiles (which is the globe icon).
We have a profile for every country, allowing your team to get a complete overview of country information, including the threat level of a country, linked incidents, involved parties and the latest news. This information is concise and actionable, providing the maximum value for your team. The main benefits of country profiles include:
So, how do country profiles work?
How to find, use and get the most value out of the actor profiles feature.
Actor profiles are one of our premium features; if you have this included as part of your subscription, you will be able to access it by clicking on the profile selector icon in the right-hand side menu. This will open a sub-menu; you can then select actors (which is at the top of the sub-menu).
We have hundreds of actor profiles for various groups and individuals operating within different countries. This information is concise and actionable, providing the maximum value for your team. The main benefits of actor profiles include:
So, how do actor profiles work?
The Threat Grid is a simple way to visualize country threat assessments at a high level. This fully customizable feature is built around your business needs. This article will explain how the Threat Grid works.
This feature is linked to the Threat Map; if you haven’t already read about it, you can do so here.
The Threat Grid is an alternative view of the map that allows you and your team to see, at a glance, what the level of threat is within different categories corresponding to different countries.
If you have already set threat levels for countries most relevant to your business in the Threat Map, you can view and amend them here. If not, refer to the Threat Map article to set these up.
This is a fully customizable feature that will be built to meet your organization’s bespoke needs.
Below is an example of what could be created for you and an explanation of how it would work if you requested this feature.
Once set up, you can view a threat assessment of countries that matter most to you.
The Threat Map feature provides you and your team with a high-level visual overview of the level of threat within specific countries. This article will show you how the feature works.
The Threat Map is a fully customizable feature. It allows you to score countries based on criteria that matter to you and your team. It then provides a very high-level overview of the threat level, aiding with decision-making by reflecting exactly how you measure threat.
Below is an example of what could be created for you and an explanation of how it would work if you requested this feature.
Learn how to log in to the Intelligence Fusion platform.
Learn how to log out of the Intelligence Fusion platform.
If you’ve forgotten your password or would like to routinely change it to ensure your account is secure, you can follow these steps.
Forgotten Password
If you can’t log in to the Intelligence Fusion platform because you’ve forgotten your password, you’ll need to follow the Forgotten Password flow.
Update Password from Account
If you’re already logged in to the Intelligence Fusion password but would like to change your password manually, you can do this in your Account Settings.
How to keep your data safe by activating 2FA on your Intelligence Fusion account.
Two-factor authentication (2FA) is now mandatory on all Intelligence Fusion accounts. 2FA won’t be new to you; it’s a mandatory requirement for most software and platforms you use daily. It’s designed to significantly reduce the risk of unauthorized access and system breaches by adding a second layer of identification when logging into the platform.
We know that many of you use us whilst on the move, too, so enforcing 2FA means you’ll have greater security when accessing Intelligence Fusion from any device or location – without putting your sensitive data at risk.
If you need to update some of the details on your account, you can do so via the Intelligence Fusion platform – here’s how.
If you would like to change your email address, this would need to be done by contacting your Customer Success Manager.
Keeping us up to date on your intelligence requirements continues to ensure that you’re getting the most relevant and tailored feed possible.
Your Intelligence Collection Plan (ICP) is a dynamic and fluid document. We’ll regularly review it together, but you can also change and update the details at any time.
We recommend doing this with your Customer Success Manager, who can contact using the following details:
📨 rebeccasutton@intelligencefusion.co.uk
☎️ +44 (0)1931 770 110
Whilst we strive to be as flexible and accessible as possible, your Customer Success Manager will typically work UK office hours, between 9.00am and 5.00pm GMT.
If you have an urgent intelligence request outside of these hours and aren’t receiving a response from your CSM, you can contact our 24/7 Operations Team on the following details:
📨 operations@intelligencefusion.co.uk
☎️ +44 (0)191 380 4004
Your Customer Success Manager is here to ensure you get the most out of your subscription, and is your first point of contact should you need any further support.
You can contact your Customer Success Manager using the following details:
📨 rebeccasutton@intelligencefusion.co.uk
☎️ +44 (0)1931 770 110
Whilst we strive to be as flexible and accessible as possible, your Customer Success Manager will typically work UK office hours, between 9.00am and 5.00pm GMT.
If you need urgent support outside of these hours and aren’t receiving a response from your CSM, you can contact our 24/7 Operations Team on the following details:
📨 operations@intelligencefusion.co.uk
☎️ +44 (0)191 380 4004
Compiling an ICP is an essential part of the onboarding and delivery process, in this article, we will take a look at why.
An Intelligence Collection Plan (ICP) helps to close gaps in knowledge and provides clear direction for the intelligence collection process. An ICP also gives intelligence teams a standard structure to work from and helps analysts stay focused on the task at hand.
The intelligence collection plan process helps us to develop a deep understanding of your operations as well as who or what you’re protecting.
We aim to understand:
Whilst our coverage is global, we prioritize our client’s needs first and foremost. The detail we collect allows us to provide you with a comprehensive and complete intelligence picture tailored to your organization.
One of the first milestones of your onboarding journey includes an ICP, which is then regularly reviewed on a monthly basis. This critical session will guide our collection efforts and ensure that our team fully understand how your organization operates, the threats you face and why they’re important.
Your intelligence collection plan is a working document. So as your organization evolves or your needs change, we can be reactive to new requirements.
For example, if you’ve recently acquired a new asset or facility in a new region, or your business operations have changed to adapt to the ‘new normal’, you may need us to start collecting intelligence in new areas that weren’t part of your original collection plan.
These requests may be temporary or long-term – either way, we’re structured in a way that allows us to quickly and easily react to changing requirements.
Gathering intelligence is a thorough and skilled process; in this article, we explore how intelligence analysts work.
The Intelligence Fusion Operations Team is made up of 20 highly trained intelligence analysts with a diverse range of experience and expertise. The team work around the clock from our 24/7 Operations Centre to identify, report and analyze incident data for our clients.
Doing so, starts with our military principles – using the intelligence cycle to put order into the intelligence collection process and drive our analysis.
Due to the vast amount of data available, the intelligence cycle provides an order to the collection and information-gathering process. It states exactly what needs to be collected, in what priority and when. We use the intelligence cycle internally for various reasons. But most importantly, it helps us focus our collection efforts to best meet the needs of you and your organization.
This is a four-stage process comprising Direction, Collection, Processing and Dissemination.
Step 1: Direction
The first stage of the cycle is to determine the intelligence requirements and plan the collection efforts – creating a clear focus and list of priorities for the intelligence team and ensuring that all information gathered is geared towards a clear purpose.
Step 2: Collection
Once we have the intelligence requirements, we can begin our collection process – using our vast range of sources with both manual collection from our 24/7 operations center and automated collection through datamining.
Step 3: Processing
We use the intelligence cycle internally for several reasons, but most importantly, it helps us focus our collection efforts to best meet the needs of you and your organization. The result of this is that, regardless of if the incident was identified by our team or picked up by our datamining technology, each new piece of information is:
This ensures accurate data is reported that’s not only insightful but practical, too.
Step 4: Dissemination
The final stage of the intelligence cycle is the timely delivery of intelligence to those who need it through threat intelligence software.
Intelligence must be disseminated in a way that’s appropriate for the user, highlighting the key facts and our interpretation, comment or assessment. This is why we emphasize the way incident data looks within our threat intelligence platform.
The Intelligence Cycle is part of wider training that all our intelligence analysts partake in as part of their onboarding and ongoing development. The training was designed using military intelligence processes and principles alongside all real-life experiences, case studies and examples from our intelligence teams’ previous careers spanning multiple countries and sectors.
Alongside the specialist training that all our analysts have, many are also subject specialists and bilingual, which allows for a wider range of sources to be accessed. Languages that are spoken within the team include but are not limited to Russian, French, Spanish, Arabic and Hindi.
Our analysts come from a variety of backgrounds, including academic, military and commercial. They cover broad geographical regions, but specialty areas and specific interests include security in South and Central Asia, politics in China and the Taiwan Strait, Iraqi domestic politics and anti-AI sentiment in the USA.
Our analyst team combines military experience with academic backgrounds, with many of our team holding post-graduate degrees in relevant themes such as terrorism studies and military history.
©2025 Sigma7 :: All Rights Reserved :: Site by 2NDST