The World's Most Advanced Weapons Technical Intelligence Platform
CODEX is the world's most advanced Terrorist Weapons Technical Intelligence (TWTI) knowledge center -- built by intelligence veterans and C-IED specialists, spanning 20 years of IED assembly data, initiation systems analysis, modus operandi tracking, and concealment/camouflage intelligence. Millions of indexed items searchable on a single platform, with source material analyzed from Arabic, Farsi, Hebrew, and additional languages by native-speaking analysts. Enriched by Al-Khemia forensic HME lab analysis.
Institutional Memory for Counter-Terrorism
Extremist organizations evolve, rebrand, splinter, and merge. Understanding their current form requires understanding their history. CODEX preserves and indexes content that has been removed from the internet -- collected in real time, every day, for two decades.
Longitudinal Data
Radicalization trajectories span years. Without historical data, early indicators are invisible. CODEX tracks continuity across name changes, mergers, and leadership transitions.
Preserved Content
Removed content is often the most significant. CODEX preserves what the internet forgets -- propaganda, recruitment materials, operational planning, and communications that no longer exist anywhere else.
Analyst-Verified
Not scraped retroactively. Collected in real time and verified by analysts with direct operational experience in counter-terrorism. Every record carries provenance metadata.
The Archive
What the Internet Forgets, CODEX Remembers
Two decades of continuously collected extremist content, indexed and searchable.
More Than a Database
Query across the full CODEX intelligence holdings using structured filters, Boolean logic, and natural-language input. Results return with provenance metadata so you know exactly where each data point originated.
[*] Authenticating analyst session... AUTHORIZED
[*] Searching millions of indexed items across CODEX holdings...
[*] Cross-referencing threat actor profiles...
[*] Applying temporal and geographic filters...
[001] TG-IED-2024-0847
VBIED Design Evolution: Syria-Iraq Corridor, Q1-Q3 2024
Type: Mobius Report | Distribution: Subscribers Only | Actors: 3 linked cells
Provenance: Field collection + forensic exploitation + WEBINT correlation
[002] TG-NET-2024-0391
IED Precursor Procurement Network: Gulf States Supply Chain
Type: Hydra Report | Distribution: Subscribers Only | Linked profiles: 47
Provenance: HUMINT + financial intelligence + open-source correlation
[003] TG-ALT-2024-1203
Remote Detonation TTP Shift: Drone-Initiated IEDs in Yemen
Type: TG Alert | Classification: URGENT | Cross-ref: UAS domain
Provenance: Multi-source validated | Analyst confidence: HIGH
[i] 1,844 additional results available. Use --page 2 or --export csv to continue.
[i] Related queries: "IED forensic signatures", "bomb-maker profiles Middle East", "VBIED evolution timeline"
Coverage Across Every Threat Vector
CODEX intelligence holdings span the full spectrum of counter-terrorism threat domains, each enriched with two decades of historical depth.
IED / Explosive Threats
Comprehensive database of improvised explosive device designs, components, TTPs, and forensic signatures spanning two decades of global IED activity. Cross-referenced by device family, triggering mechanism, and bomb-maker profile.
CBRN Threats
Chemical, biological, radiological, and nuclear threat intelligence. Tracks extremist interest in unconventional weapons, precursor procurement, and capability development indicators.
Drone / UAS Threats
Tracks the evolving use of unmanned aerial systems by extremist and non-state actors. Includes modification techniques, deployment TTPs, countermeasure intelligence, and incident cataloguing.
Extremist Networks
Profiles of individuals, organizations, cells, and networks cross-referenced across aliases, platforms, and time periods. Tracks active conflict zones including Israel-Hamas, Russia-Ukraine, Myanmar, Sudan, Yemen, and cartel operations.
Terrorism Financing
Intelligence on financial networks supporting extremist organizations. Covers hawala networks, cryptocurrency usage, front organizations, and sanctions evasion techniques documented over 20 years.
Regional Threat Coverage
Geospatially indexed threat data across every major conflict zone and area of extremist activity. Location-tagged events, safe houses, training camp locations, and attack sites -- searchable by region and time period.
Forensic Intelligence
Every Device Tells a Story
From IED forensic signatures to bomb-maker profiles, CODEX connects the physical evidence to the network behind it.
Finished Intelligence, Not Raw Data
CODEX delivers structured intelligence products built by subject-matter experts with direct operational experience. 20,000+ published reports produced at a rate of 164 per year across four named series.
Mobius Reports
Deep C-IED intelligence and terrorist TTPs exposed. Operational and technical analysis of worldwide improvised threat events across six categories: IED assembly, initiation systems, modus operandi, concealment/camouflage, countermeasure awareness, and standard weapons utilization. 96 reports per year (8/month), analyzed by Chief Superintendents (Ret.) Michael Cardash and Kobi Preger.
Hydra Reports
Strategic WEBINT insights for counter-terrorism. Monthly report on jihadi propaganda, recruiting efforts, targets, and methodology. Provides strategic-level context on the evolving extremist threat landscape. 12 reports per year.
TGAlerts
Terrogence Global's Alert Service. Worldwide imminent terror threats -- timely reporting of new events, significant incidents, and indicators of imminent activity. 48 reports per year (4/month).
Al-Khemia Reports
Forensic chemical analysis of authentic terrorist homemade explosives (HME). In-depth forensic analysis via laboratory re-synthesis of HME recipes sourced from extremist channels. The only commercial intelligence product providing lab-verified HME forensic data. Up to 8 reports per year.
MOBIUS REPORT TG-MOB-2025-0142
--------------------------------------------
TITLE: Network Evolution: Al-Qaeda in the Arabian Peninsula, 2018-2025
DISTRIBUTION: Subscribers Only
PAGES: 47
PROFILES: 128 linked actors
SOURCES: Multi-source (HUMINT, OSINT, archived comms, forensic exploitation)
--------------------------------------------
Access requires active CODEX subscription. Contact your account manager.
Today's Threat Was Yesterday's Signal
The difference between raw data and actionable intelligence is expert curation. Every record in CODEX passes through a multi-stage validation pipeline.
Human-Verified
Every profile, incident record, and organizational mapping is reviewed by trained analysts before entering the archive. No automated data dumps.
Unverified scrapes from open sources
Analyst-confirmed with provenance metadata
Analyst-Curated
Subject-matter experts with military intelligence backgrounds tag, contextualize, and cross-reference each record against existing holdings.
Isolated data points without context
Cross-referenced with 20 years of holdings
Context-Enriched
Raw intelligence is transformed into structured, queryable records enriched with organizational links, TTP mappings, and temporal relationships.
Flat text with no relational structure
Structured records with entity relationships
Threat Landscape
Understanding Today Requires Yesterday
The threat landscape does not pause for analysis. CODEX delivers the historical depth that transforms reactive intelligence into proactive defense.
Access the World's Most Advanced Weapons Technical Intelligence Platform
See how 20 years of counter-terrorism intelligence can enhance your analytical capability. Request a personalized demonstration.