Sentryum
SENTRYUMSecurity & Economic Intelligence
Security & Economic Intelligence Firm

Reducing your uncertainty,
our commitment.

When facing critical decisions and crises, neither paranoia nor naivety. Take back control.

EuropeFrancophone AfricaEast AfricaIndian Ocean
The Firm

An analysis and execution firm

Every engagement starts with a precise question — not a research query, a real question with real stakes. Cross-referenced sources, qualified actors, identified dependencies.

The firm's analytical approach is rooted in field experience — environments where the gap between reality and what is declared is the rule, not the exception.

We operate with absolute discretion. Every engagement is covered by a strict confidentiality agreement.

What sets us apart

We do not produce reports. We produce answers. The difference lies in asking the right question from the outset — and in the rigour with which it is answered.

6
Lines of intervention
4
Focus areas
48h
Response time
100%
Engagements under NDA
Expertise

Our capabilities

Six lines of intervention calibrated to deliver direct analytical impact.

01

Economic Intelligence

Reading an environment, a market or an actor beyond what is visible. Power dynamics, influence networks, vulnerability zones.

02

Strategic Intelligence Monitoring

Continuous reading of an environment or an actor. Detecting weak signals before they become problems.

03

Due Diligence

What official records do not say. Actual track records, networks, legal exposures, litigation.

04

Digital Exposure Audit

What a hostile actor can learn about you before even making contact. Exposed pivots, actual attack surface.

05

Stakeholder Mapping

Who controls what in a given ecosystem. The actors who determine outcomes and do not appear on the org chart.

06

Analytical Support

A second analytical eye on a complex file. Challenging assumptions, identifying blind spots, improving the decision.

Method

Our method

Every intervention begins with precise scoping. The engagement only starts once the real question has been established.

01

Scoping

The initial request is not always the real question. Before any collection, we clarify what actually needs to be known.

02

Targeted collection

Sources and methods selected based on the question, not a standard protocol.

03

Qualification

Every element is cross-referenced and assessed. What is established, probable or uncertain. This hierarchy is not optional.

04

Contextualisation

A fact without context is useless. We place every element within its logic: interests, track records, influence structures.

05

Delivery

Executive summary, structured report, oral briefing. The format that suits the client. Immediately actionable.

06

Commitment

All our engagements are covered by a confidentiality agreement. What you entrust to us stays within the contractual framework.

Operational Scenarios

Do you recognise any of these situations?

Contexts we know well. Questions we know how to answer.

Securing a degraded operational environment

You operate in an ecosystem marked by interpersonal tensions, competing influence dynamics and high reputational stakes. You no longer know who deserves unconditional trust.

Typical profile: Executive, fund partner or entrepreneur.

InfluenceReputationPersonal exposure

Approach

01

Multi-layered relationship mapping.

02

Weak signal analysis and narrative dynamics.

03

Assessment of exploitable vulnerabilities.

Outcome

You know who is who, who does what, and where you are exposed. Protection calibrated to your actual situation.

Deliverables: Relationship map · Risk matrix · Protection posture

In-depth investigation on an individual

You are about to engage with an individual whose background shows inconsistencies. The stakes do not allow for blind trust.

Typical profile: Investor, fund, law firm.

Individual due diligenceDigital exposure

Approach

01

Multi-source collection.

02

Identity and activity correlation.

03

Informational vulnerability analysis.

Outcome

What the individual chose not to show. Enough to decide with eyes wide open.

Deliverables: Full profile · Network map · Decision brief

Strategic mapping of a corporate group

You are evaluating an acquisition in a group whose governance is opaque. Nothing matches the official disclosures.

Typical profile: PE fund, DFI, law firm.

Corporate due diligenceGovernance

Approach

01

Reconstruction of legal and financial structure.

02

Actor mapping and capital flow analysis.

03

Identification of structural risks.

Outcome

Who actually controls this group. The map that official documents do not provide.

Deliverables: Corporate structure chart · Key actor profiles · Risk assessment

Analysis of a high-information-warfare ecosystem

An actor is generating a narrative that directly affects your operational environment. You need to understand its actual architecture.

Typical profile: Corporate group, state entity, investor.

Information warfareInfluence networks

Approach

01

Mapping of networks and affiliations.

02

Discourse and dissemination channel analysis.

03

Amplification dynamics study.

Outcome

Who is behind it, how it works, what the leverage points are.

Deliverables: Influence map · Narrative brief · Counter-posture options

Exposed executive — Security audit

Your visibility has grown with your assets. You are identifiable online and in the physical world. Your exposure is a vector.

Typical profile: Executive, entrepreneur, HNWI.

Personal securityDigital exposureAsset protection

Approach

01

Full OSINT exposure audit.

02

Targeting vector analysis.

03

Exposure reduction plan.

Outcome

What a hostile actor sees of you. What they can do. How to reduce that surface.

Deliverables: Digital footprint · Threat vectors · Reduction plan

Intelligence in Action

Case studies

Six real, anonymised interventions. The logic and impact of each engagement are intact.

Financial & Extra-Financial Due Diligence

Due diligence prior to equity stake

A fund evaluates an equity stake in a West African entity. The documents provided are consistent on the surface. We identify actual ownership diverging from declarations, undisclosed beneficial owners, active litigation in a third jurisdiction and capital links to entities under regulatory scrutiny.

Ownership · UBO · Litigation · Capital links

The client withdraws from the engagement and avoids an estimated exposure of EUR 2.4 million — along with major reputational, legal and financial risk.

Due diligenceGovernanceAfrica
Security Monitoring

Weekly Sahel intelligence brief

A businessman operating between Accra and the Sahel region needs a continuous reading of his environment. We set up a weekly report covering Mali, Burkina Faso and Nigeria: security situation, political dynamics, weak signals affecting his operations.

Security situation · Political dynamics · Weak signals · Travel

Concrete recommendations on operations and decisions to defer. Two major incidents anticipated before materialisation.

MonitoringSahelDecision support
Defensive OSINT Audit

Exposure audit for a fundraising executive

An executive in the fundraising phase wants to know what a hostile third party could piece together about them. We map all exposed pivots: personal data, addresses, identifiable assets, professionally and family connections publicly accessible.

Exposed pivots · Identifiable assets · Accessible relationships · Vulnerabilities

Structured report by pivot, risk level per category, remediation plan with opt-out, anonymisation and de-indexing.

ExposureRemediationExecutive
Offensive OSINT Audit

Attacker posture on a crypto CTO

A major crypto-asset holder, also CTO of a Web3 startup valued at EUR 900 million, engages us to adopt the attacker's posture. Objective: measure what a malicious actor can correlate between their civil identity, wallets, visible assets and digital footprint.

Identity/wallet correlation · Visible assets · Social engineering · Physical targeting

Identification of doxxing, extortion and physical targeting vectors. Full hardening of defensive posture.

CryptoWeb3Targeting
Economic Intelligence

Energy market entry in sub-Saharan Africa

A European industrial group is preparing to enter the energy sector in sub-Saharan Africa. We map the full ecosystem: dominant actors, actual decision circuits, regulatory and political dynamics, positioned competitors, reliable intermediaries and anticipated obstacles.

Dominant actors · Decision circuits · Competitors · Regulation

The deliverable identifies credible entry options and the power dynamics to integrate before any commitment.

MappingEnergyAfrica
Information Warfare

Analysis of a narrative pressure sequence

A listed group faces a media pressure sequence built from public facts reframed into a hostile narrative. We deconstruct the mechanics: actors behind the exposure, amplification relays, sequence timeline, impact on governance.

Actors · Amplification · Timeline · Governance

The client has a clear reading of what happened, why, and what counter-posture options are available.

Info warfareReputationCounter-posture
Geographic Expertise

Ground-level reading, not desk research

Our focus areas are those where surface-level information is systematically misleading.

Zone 01

Europe

Sector-specific economic intelligence, corporate due diligence, conflict analysis and information warfare.

Industrial groups · Law firms · C-suites

Zone 02

Francophone Africa

West and Central Africa. Investment risk, actor mapping for PE funds and DFIs.

PE funds · DFIs · Impact investors

Zone 03

East Africa

Ethiopia, Kenya, Somali corridor, Djibouti. Security risk, infrastructure intelligence.

Infrastructure groups · Commodity traders · State entities

Zone 04

Indian Ocean

Mauritius, Reunion, Mayotte, Comoros, Seychelles. Africa/Middle East/Asia crossroads. Due diligence and exposure audit.

Investors · Commercial groups · Exposed profiles

Insights

Strategic readings

Analysis and briefings on the subjects that shape our work.

Sahel — JNIM

Sahel: the rise of JNIM, a new security reality for European operators

Since the French withdrawal and the dissolution of MINUSMA, the JNIM (Jama'at Nusrat al-Islam wal-Muslimin) has been extending its grip across Mali, Burkina Faso and northern Nigeria. Analysis of the implications for businesses and investors still exposed in the Sahel belt.

Sources: ACLED, ICG, UN report S/2024/901, field OSINT

Read the analysis →
Bybit hack

Bybit: $1.5 billion stolen — what the largest crypto hack reveals about Web3 actor exposure

On 21 February 2025, the Lazarus Group stole $1.5 billion from the Bybit exchange. A look at the attack mechanisms, OSINT traceability of wallets, and concrete lessons for crypto holders and ecosystem leaders.

Sources: Chainalysis, Elliptic, ZachXBT, Arkham Intelligence

Read the analysis →
Capgemini ICE

Capgemini–ICE: autopsy of an exit under informational pressure

On 1 February 2026, Capgemini announces the divestiture of its Government Solutions subsidiary following a narrative pressure campaign built from public facts. Deconstructing the mechanics: exposure, moral reframing, amplification, governance arbitrage.

Sources: Observatoire des multinationales, Capgemini IR, specialist press

Read the analysis →
Strait of Hormuz

Strait of Hormuz: Iranian tensions and impact on African growth

Rising tensions between Washington and Tehran pose a direct risk to oil transit through Hormuz. Domino effect on African economies dependent on energy imports: rising logistics costs, inflationary pressure, weak signals for investors.

Sources: EIA, World Bank, IMF, Lloyd's List, maritime OSINT

Read the analysis →
Engage Sentryum

Submit a confidential enquiry

Enquiries are handled with the care that every sensitive subject requires. We respond within 48 business hours.

If your situation cannot be detailed in writing, we can arrange an initial discussion in whatever format suits you.

OfficesGenève · Paris · Nairobi
RegionsEurope · Francophone Africa · East Africa · Indian Ocean
Confidentiality by default. Every enquiry is handled under strict NDA. No information relating to a client is disclosed outside the contractual framework.