Search
Type a country, region, or keyword. Results in under 500 ms. Filter by severity, source, time window, or geographic radius.
Real-time, source-corroborated incident intelligence for UN missions, multilateral agencies, and institutional security teams. Search any country in 500 ms. Generate a briefing-grade PDF in one click. Forward to your superior with a tamper-proof audit trail.
quintarthai.com/tracker/api/processor/status — refresh the page to see them update. Hidden if the API is unreachable.The act of producing a credible threat brief, collapsed onto a single screen.
Type a country, region, or keyword. Results in under 500 ms. Filter by severity, source, time window, or geographic radius.
Drag incidents into the side panel. One click generates a UN-style PDF briefing — executive summary, timeline, geo heat-map, source provenance, and a tamper-proof SHA-256 hash.
Send the brief to your superior via secure link. Full audit trail: who opened, when, from where. Optional auto-route to mission lead by region.
Diplomatic security, field-mission safety, OCHA situational awareness, country-team daily briefings. Replaces the morning OSINT scramble.
Field teams, Red Cross / Crescent national societies, NGO logistics. Decisions about staff movement and aid corridors, made on verified signal — not Twitter.
Embassy DSS officers, corporate global security, sovereign-wealth risk desks. Same console, different data ACL — political risk meets operational ground truth.
Every card in IMS is auditable down to the source URL and timestamp. This is what an analyst sees — and what your buyer will paste into their procurement deck.
Forward to DSS Regional Security Officer, East Africa · auto-include adjacent corridor incidents (last 48h).
The same event reported by four sources surfaces as one incident — not four. We cluster on entity, geo, and time, not just text similarity.
A signal is promoted to Verified only when ≥ 2 independent sources of distinct type confirm the core facts. Single-source items remain visible but flagged.
Every fact is hash-linked to its original source URL and timestamp. Every PDF export carries a SHA-256 you can verify offline. No invisible edits, ever.
An honest comparison. Where the incumbent is genuinely better, we say so.
| IMS | Dataminr First Alert | Manual OSINT | |
|---|---|---|---|
| Public live feed (no login required) | Yes | No | N/A |
| One-click UN-style briefing PDF | Yes | No | Manual |
| Source-by-source provenance on every card | Yes | Partial | Yes |
| Tamper-proof export (SHA-256) | Yes | No | No |
| Transparent pricing | Yes | No | N/A |
| Time-to-first-pilot | 14-day target | ≥ 60 days typical | N/A |
| Designed for multilateral procurement | Yes | Generic | N/A |
| Raw signal scale (firehose volume) | Curated | Best-in-class | Limited |
| Years of brand recognition | Emerging | Established | N/A |
We win on workflow, transparency, and procurement fit. Dataminr wins on raw scale and brand recognition. If your job is to produce a credible brief by 09:00, IMS is built for you.
Roadmap items are stated as roadmap. We will never label a planned capability as “available” on this page. Ask us for the engineering log if you want to see exactly where we are.
If we want you to trust us with a mission, we have to start by being trustworthy with our writing.
A live-generated, SHA-256-stamped PDF built from the last 24 hours of corroborated incidents on the public feed. The exact format your team would receive.
Download the sample PDF →Auto-curated from public GDELT 2.0 articles + IMS corroborated incidents across Mali, Burkina Faso, Niger, Chad & Sudan. SHA-256 verifiable.
Download the Sahel brief →Worked example following one synthetic incident through signal, cluster, corroborate, brief, forward, open, verify. Hand to your security/audit team.
Download the audit trail →The Shared Assessments SIG-Lite, pre-filled with IMS architecture. Every row tagged ANSWERED · PARTIAL · PLANNED · ORG-SPEC · N/A. Read it before the call.
Open SIG-Lite scaffold →A walk-through of dedup, cross-corroboration, and provenance hashing — with a live incident worked end-to-end.
Reserve a seat →The exact UN-style PDF IMS produces — classification banner, source list, geo heat-map, SHA-256.
Download a sample →IMS is being built in the open, with a small cohort of UN missions, humanitarian operators, and institutional security teams. Founding Partners get direct access to the team, custom source ingestion, and lifetime preferred pricing.
Every minute between a signal appearing and a decision being made is a minute that costs your operation. IMS exists to close that minute.
Book a personalised briefing →Public open-data sources only at this stage: GDELT 2.0, ReliefWeb, OCHA, and a set of newswire and humanitarian feeds. The live /tracker/api/processor/status endpoint returns the real active source count and the real incidents-in-last-24h as live numbers — those are the numbers shown in the stats strip above when the API is reachable. We do not invent counts.
We never weight a source by editorial stance. Promotion to Verified requires ≥ 2 independent sources of distinct type (e.g., wire + sitrep, not two wires). Single-source items remain visible but explicitly flagged.
Retraction is propagated within minutes — the incident card is marked Retracted and any forwarded brief surfaces a banner the next time it is opened. The audit trail is preserved.
Yes — air-gapped on-prem deployment is available on the Institutional tier. Includes a signed Helm chart, hardened base images, and quarterly security patches.
The ingestion pipeline parses signals across multiple source languages (the multilingual GDELT 2.0 corpus is one feed; ReliefWeb publishes in EN/FR/ES; AFP feeds are multilingual). The briefing UI is currently English-only — additional UI locales are on the roadmap and will be prioritised by the founding cohort. We don't claim a specific language count until each one is fully tested end-to-end.
Uptime SLA is offered on contract, not as a marketing claim. Live status is published at /ims/status, which reflects real numbers from the operating console at quintarthai.com/tracker. We will not advertise an SLA percentage we cannot defend in a procurement audit.
Target time-to-pilot is 14 days from signed contract. We are pre-launch and have not yet completed our first paid pilot, so this is a target — not a measured median. Procurement docs (DPA template, security questionnaire) are available on request; the SIG-Lite pre-fill is on the founding-cohort roadmap.
Pilots in 14 days. No 12-month contract to find out if it works.