Defense-Threat-Intel
Verifiedby Dryade
Description
Multi-source threat intelligence analysis with entity correlation, pattern detection, and intelligence product generation
Screenshots
Details
defense-threat-intel
Tier: Enterprise | Type: Agent | Category: Intelligence | Version: 1.0.0
Sovereign AI-powered threat intelligence analyzer for multi-source OSINT correlation, entity extraction, credibility assessment, and structured intelligence product generation. Designed for on-premise and air-gapped deployment.
1. Overview
Plugin Name: defense-threat-intel Slug: defense-threat-intel Required Tier: Enterprise Plugin Type: Agent Category: Intelligence Author: Dryade License: DSUL
What It Does
Ingests multi-source intelligence reports (OSINT, official communications, satellite analysis), extracts named entities, correlates information across sources, assesses credibility using the NATO admiralty system, and generates structured intelligence products (threat assessments, timelines).
Key Capabilities
- Multi-source OSINT report analysis with indicator detection
- Named entity extraction (persons, organizations, locations, events)
- Cross-source correlation identifying corroborated vs. unique intelligence
- NATO admiralty system credibility assessment (A-F / 1-6)
- Chronological timeline construction from multiple sources
- Structured threat assessment generation with French defense terminology
2. User Stories
Primary User Stories
US-1: Multi-Source Intelligence Correlation
As an intelligence analyst, I want to correlate information across multiple OSINT reports so that I can identify corroborated intelligence and emerging patterns.
Acceptance Criteria:
- [x] Entities mentioned across 2+ sources are flagged as corroborated
- [x] Unique mentions are flagged for further verification
- [x] Correlation confidence levels are assigned
US-2: Threat Assessment Generation
As a threat assessment officer, I want to generate structured threat assessments from available intelligence so that I can brief decision-makers efficiently.
Acceptance Criteria:
- [x] Formal threat assessment document generated with all required sections
- [x] Threat level classification (faible/modere/eleve/critique)
- [x] Source attribution and recommendations included
3. Architecture
Component Diagram
+------------------+ +------------------+ +------------------+
| Orchestrator | --> | Threat Intel | --> | Data Provider |
| (agent tools) | | plugin.py | | (mock / real) |
+------------------+ +------------------+ +------------------+
|
+-----v------+
| Demo Data |
| data/*.json|
+------------+
Dependencies
- Internal: core.plugins.EnterprisePluginProtocol, core.plugin_config_store.PluginConfigStore
- External: None (standard library only)
- Plugin: None
4. Agent Capabilities
Agent Tools
| Tool Name | Input | Output | Description |
|-----------|-------|--------|-------------|
| analyze_osint_report | report_text: str | JSON analysis | Analyze OSINT report for key indicators |
| extract_entities | text: str | JSON entities by category | Extract named entities from text |
| correlate_sources | report_ids: str | JSON correlation results | Cross-correlate multiple reports |
| assess_credibility | source_type: str, report_text: str | JSON credibility rating | NATO admiralty credibility assessment |
| build_timeline | report_ids: str | JSON timeline | Build chronological event timeline |
| generate_threat_assessment | topic: str, region: str | JSON threat assessment | Generate structured threat assessment |
5. Data Flow
Demo Data Description
entity_database.json: 15 entities (5 persons, 5 organizations, 5 locations) in fictional Ostlavie-Valdorie scenarioosint_reports.json: 8 synthetic OSINT reports across media, official, satellite, and social media sourcescredibility_rubric.json: NATO admiralty credibility system referencethreat_assessment_template.json: Formal threat assessment template with 9 sectionsgeopolitical_context.json: Fictional geopolitical scenario background
Total: 5 demo files covering a complete fictional intelligence scenario.
6. Security Considerations
Data Handling
- PII: No - all demo data uses entirely fictional entities
- Encryption: N/A - on-premise only, designed for air-gapped networks
- Data Retention: Plugin does not persist data beyond the session
Isolation
- Fully on-premise, zero external network dependencies in mock mode
- Designed for deployment in classified network environments (SCIF-compatible)
- No data exfiltration risk - all processing is local
7. Test Plan
Test Classes
| Class | Tests | Coverage Target |
|-------|-------|----------------|
| TestPluginAttributes | 8 tests | Manifest consistency |
| TestPluginConfig | 2 tests | Mock/real toggle |
| TestDemoData | 6 tests | Data presence and structure |
| TestThreatIntel | 8 tests | Core intelligence analysis |
Running Tests
cd dryade-plugins
python -m pytest enterprise/defense-threat-intel/tests/ -x -v --tb=short
8. Deployment Notes
Requirements
No external packages required.
Configuration
{
"data_source": "mock"
}
Compatibility
- Min Dryade Version: 1.0.0
- Python: >=3.11
- Notes: On-premise and air-gapped deployment only. No cloud dependencies.
9. User Guide
Getting Started
- Ensure your Dryade instance has an Enterprise tier license
- Install the plugin via the marketplace or
dryade-pm push - Ask the AI assistant to "analyze this intelligence report"
- Provide OSINT text or request correlation across reports
Common Workflows
Workflow 1: OSINT Analysis
- Provide an OSINT report text
- Ask: "Analyze this report and extract entities"
- Review findings, indicators, and entity relationships
Workflow 2: Multi-Source Correlation
- Analyze multiple reports individually
- Ask: "Correlate reports RPT-001, RPT-002, RPT-003"
- Review corroborated entities and build a timeline
10. Screenshots
Screenshots will be added after UI integration.
11. Changelog
1.0.0 (2026-03-05)
- Initial release
- OSINT analysis with threat indicator detection
- Entity extraction (persons, organizations, locations)
- Multi-source correlation engine
- NATO admiralty credibility assessment
- Timeline construction
- Threat assessment generation
- Fictional Ostlavie-Valdorie scenario demo data
Future Roadmap
- [ ] NLP-powered entity extraction (spaCy/transformers)
- [ ] GDELT feed integration for real mode
- [ ] Link analysis visualization
- [ ] Geospatial event mapping
Requires enterprise tier subscription