Frequently Asked Questions
Everything you need to know about Lumen and narrative intelligence.
General
Narrative intelligence is the systematic detection, analysis, and attribution of coordinated information campaigns targeting your organization. Unlike traditional media monitoring, it identifies the structure, coordination patterns, and likely actors behind narrative attacks — not just what's being said, but who's behind it and why.
Media monitoring tells you what's being said. Lumen tells you whether it's coordinated, who's likely behind it, and what to do about it. We apply intelligence community methodologies — Analysis of Competing Hypotheses, ICA probability standards, NATO source credibility ratings — to distinguish organic news spread from orchestrated campaigns.
Communications teams, corporate security, investor relations, and government affairs professionals at organizations that face adversarial information risk. Our initial focus is defense, pharmaceutical, private equity, and energy sectors — industries where narrative attacks carry material financial and regulatory consequences.
Lumen ingests from 40,000+ global news outlets via GDELT, Reddit communities, and expanding social media coverage. All sources are rated using NATO STANAG 2511 credibility standards — from A1 (completely reliable, confirmed) to F6 (reliability cannot be judged, truth cannot be judged).
Technology
Multi-signal behavioral analysis measuring source concentration, temporal clustering, account provenance, wire-service deduplication, and content propagation patterns. Unlike keyword monitoring, we identify the structure of campaigns — not just their content. Five independent signals are fused into a composite coordination score.
A composite metric (0–100) measuring the likelihood that content spread is coordinated rather than organic. Factors include source diversity, timing patterns, account behavior signals, title similarity across outlets, and source reputation weighting. A high score from few fringe sources with new accounts scores differently than the same timing pattern from Reuters and AP.
We apply the Analysis of Competing Hypotheses (ACH) framework used by intelligence professionals. Multiple hypotheses are evaluated against available evidence. Confidence is expressed using ICA probability standards — Almost Certainly (95%+), Likely (70–85%), Roughly Even (45–55%), Unlikely (15–30%), Remote (<10%). We never use vague terms like 'possible' without defined probability ranges.
When no active campaigns are detected, Lumen doesn't go silent. Quiet week reports apply six OSINT frameworks — Priority Intelligence Requirements, Gap Analysis, F3EAD targeting methodology, Timeline Analysis, Analysis of Competing Hypotheses, and geopolitical context mapping — to proactively assess your threat landscape and identify precursor indicators.
Pricing & Plans
FeatureMonitorAnalyst
Real-time narrative detection✓✓
Coordination scoring (5-signal)✓✓
Weekly AI intelligence reports✓✓
In-app alerts & email notifications✓✓
Up to 3 monitored entities✓✓
Human analyst review—✓
ICA attribution assessments—✓
Strategic recommendations—✓
Emergency on-demand analysis—✓
Dedicated analyst contact—✓
Yes. Request a demo and we'll walk you through a live analysis of your current threat landscape. No synthetic data — we analyze real narratives relevant to your organization during the demo.
Yes. Contact us for annual pricing. Enterprise agreements with custom coverage, dedicated analyst time, and SLA guarantees are also available.
Analyst subscribers receive two on-demand emergency analyses per month at no additional cost. Additional analyses are available on-demand at $299 (Monitor) or $399 (Analyst) per analysis. Emergency analyses are initiated through the dashboard and typically delivered within 4 hours.
Security & Privacy
All data is encrypted at rest (AES-256) and in transit (TLS 1.3). Infrastructure is hosted on SOC 2 compliant providers. Access controls enforce subscriber isolation — no cross-tenant data access is possible.
We retain analyzed data for 90 days for trend analysis and baseline establishment. Raw source content is stored only as metadata references — we link to sources, not copy them. All data is subscriber-isolated with no cross-tenant access.
Yes. Full data deletion is available on request within 48 hours. Upon subscription cancellation, all subscriber data is purged within 30 days unless a retention extension is requested.