Products
Products Overview
IKE
M3
Pulse
SIGMA
TrustedKeep
Capabilities
Capabilities Overview
Solutions
Information Operations
ZeroTrust Architecture
JADC2
CBRN Detection
Expertise
DARPA R&D
Mobile Systems
High Assurance Solutions
Global Media Manipulation
Reverse Engineering
Careers
Careers Overview
Current Opportunities
Teams
Life at Two Six
Candidate Resources
Internship Program
Resources
Resources Overview
Blog
Videos
White Papers
About Two Six
Company Overview
Leadership
News
Contact Us
Products
Products Overview
IKE
M3
Pulse
SIGMA
TrustedKeep
Capabilities
Capabilities Overview
Solutions
Information Operations
ZeroTrust Architecture
JADC2
CBRN Detection
Expertise
DARPA R&D
Mobile Systems
High Assurance Solutions
Global Media Manipulation
Reverse Engineering
Careers
Careers Overview
Current Opportunities
Teams
Life at Two Six
Candidate Resources
Internship Program
Resources
Resources Overview
Blog
Videos
White Papers
About Two Six
Company Overview
Leadership
News
Contact Us
Data Science
Blog
September 25, 2024
US Elections: Moscow favors former President Trump, but avoids risks that could lead to interference accusations
Blog
August 19, 2024
How China and Russia helped Venezuelan leader Nicolás Maduro pull off his reelection heist
Blog
June 24, 2024
Comparing the CPC and CPM pricing models for Facebook advertisements
Resources
,
White Paper
June 13, 2024
SIGMA: Elevating Situational Awareness to Prevent Attacks
Resources
,
White Paper
March 21, 2024
Message Manipulation in the Digital Landscape
Resources
,
White Paper
March 12, 2024
SIGMA Edge Protocol
Blog
March 5, 2024
Two Six Technologies' M3 Biannual Report on Online Information Manipulation
Blog
February 21, 2024
Hashashin Update
Blog
September 6, 2023
Bring It On Home: An Argument for Using Small Samples to Model Patterns of Life
Blog
July 10, 2023
Three pitfalls to avoid when analyzing pro-PRC inauthentic messaging