Product · How it works

The analytical engine,
end to end.

Altare is a full pipeline: from academic and open-source ingestion, through entity resolution and disclosure cross-reference, to a structured risk memo a research security officer can brief upward. Four stages. One methodology, calibrated against documented cases.

Output follows the structured analytic techniques used in formal risk assessments: confidence levels stated on the face, alternative hypotheses considered, and intelligence gaps named explicitly, so a compliance committee can weigh a finding the same way twice.

Fig. A · Methodology Overview
Ingestion

Academic publications, funding records, and open-source professional data, aggregated and kept current.

Resolution

Author disambiguation and cross-lingual identity reconciliation across sources.

Analysis

Temporal network view of collaborations and disclosures, weighed against observed record.

Output

A structured risk memo: finding, confidence, alternative hypotheses, gaps, with audit trail.

Module 01 · Core engine

Publication Network Intelligence

The analytical engine. Builds a temporal view of a researcher's collaborations and disclosures, verifies declared funding and affiliations against the observed record, and surfaces inconsistencies visible only across languages and regulatory regimes.

Input
Publication, funding & disclosure record
Methodology
Calibrated against documented cases
Output
Structured risk memo
Plate IINetwork · risk-tiered
Module 02 · Lifecycle

Researcher Lifecycle Management

The first integrated designated-school-official and research-security-officer workflow: pre-arrival screening for grad students and visiting scholars, continuous monitoring for new undisclosed co-authorships and affiliation anomalies, and departure documentation generation for the NSPM-33 exit procedure requirement.

Entry
Visa · sanctions · conflict-of-interest
Monitoring
New foreign co-author · critical-tech alerts
Exit
NSPM-33 departure package
Integration
Designated school official + research security officer
Plate IIILifecycle · timeline
Module 03 · Compliance

Compliance Automation

Section 117 HEA foreign gift and contract monitoring, NSF Notice 149 MFTRP certification workflow, UK NSI Act and Canada NSIA checklists. Auto-generated regulatory memos pre-populated for the vice president of research and general-counsel review, with the audit trail the certification demands.

U.S.
§ 117 · NSF 149 · NSPM-33
UK
National Security & Investment Act
Canada
NSIA · Tri-Agency guidance
Audit trail
ALTARE-YYYY-NNNN case ID
Plate IVMemo · draft output
Module 04 · Roadmap

Counter-Influence

Pre-approach talent recruitment detection: behavioral signals that appear before a researcher is formally contacted. Coordinated inauthentic behavior in academic publishing: fake journal invitations, citation manipulation, ghost-writing.

Pre-approach
Behavioral signals before formal contact
CIB
Citation rings, ghost-writing, fake invitations
Status
Roadmap · 2026 H2
Plate VPre-approach signals
Equity by design

Risk comes from behavior, never from nationality.

Risk signals come from behavior, not nationality or background. Altare analyzes open-source behavioral patterns, inconsistencies, and changes over time.

See Altare at work on real data.

Six-week pilot. One department or portfolio. Real read-out, not demo data.