Insider Threat Detection:
Continuous Anomaly
Monitoring.
Security clearances tell you who someone was at the point of vetting. EchoDepth tells you who they are right now — establishing a continuous emotional baseline per individual and alerting when patterns deviate significantly. Earlier signal. Earlier intervention.
EchoDepth by Cavefish AI Ltd · Cardiff, Wales · Camera-based emotion recognition AI
How does EchoDepth detect insider threats before they occur?
Security clearances and annual reviews catch nothing in real time. Stress indicators, behavioural anomalies, and emotional changes that precede insider incidents go entirely undetected by existing TSCM and access control infrastructure. Traditional vetting misses approximately 83% of insider threats until the post-incident investigation — when the damage is already done.
EchoDepth provides a continuous passive signal layer — establishing what normal looks like for each individual, then surfacing deviations to your security operations team before they become incidents.
- Behavioural baseline profiling per individual established across working periods
- Anomaly scoring when emotional state deviates significantly from personal norm
- Direct integration with SIEM platforms — Splunk, Microsoft Sentinel, and others
- Alert escalation workflows for security operations teams with configurable thresholds
- Pre-interview emotional state capture for HR and security investigations
- UK GDPR-compliant architecture with role-based data access controls
- UK data residency and air-gap deployment for the most sensitive environments
Also see: Insider threat in cyber security context and deception detection capability.
Average cost per insider incident
£3.2M
Ponemon Institute 2024. EchoDepth surfaces the precursor signals.
Three-Phase Detection Architecture
Baseline Establishment
EchoDepth learns what emotionally normal looks like for each individual — across typical working conditions, stress events, and interpersonal interactions. Baseline is individual-specific, not population-average.
Continuous Monitoring
Passive AU analysis runs continuously against established baselines. No disruption to personnel workflow. No awareness by the monitored individual of the system's presence or active state.
Anomaly Alerting
When emotional patterns deviate beyond configurable thresholds, the system generates a structured alert for your security operations team — with supporting AU evidence and deviation score.
Frequently Asked
How does EchoDepth detect insider threats?+
EchoDepth establishes an individual emotional baseline for each person in a monitored environment over time, then detects significant deviations from that baseline — elevated stress, behavioural anomalies, and emotional patterns that precede security incidents. It operates passively using existing cameras, feeds structured anomaly alerts directly into SIEM platforms, and requires no change to personnel workflow or equipment.
How quickly does EchoDepth establish a behavioural baseline?+
EchoDepth builds a statistically significant emotional baseline within the first 5–10 working days of continuous monitoring for a given individual. Baseline profiling is individual-specific — not population-average — which means anomaly detection is calibrated to each person's actual emotional norms rather than a generic threshold.
Does EchoDepth integrate with SIEM platforms?+
Yes. EchoDepth integrates directly with Splunk, Microsoft Sentinel, IBM QRadar, and other major SIEM platforms via REST API and WebSocket. Anomaly alerts are structured as JSON output mapping to standard SIEM alert taxonomies. SOAR playbook webhook triggers and configurable alerting thresholds are also available.
Is continuous emotional monitoring compliant with UK law?+
EchoDepth's continuous monitoring capability is designed for deployment within UK GDPR, the Human Rights Act, and the Investigatory Powers Act framework for authorised monitoring in high-security environments. The system requires a legitimate interest or explicit consent basis, documented in a Data Protection Impact Assessment. Cavefish AI provides DPIA support documentation for deployment within HMG and defence environments.
How does EchoDepth compare to UEBA and periodic vetting?
Security clearances tell you who someone was at a point in time. EchoDepth tells you who they are right now.
| Capability | Periodic Security Vetting | UEBA / Behavioural Analytics | Access Logging / SIEM | EchoDepth |
|---|---|---|---|---|
| Continuous monitoring | ✗ Point-in-time only | Partial — digital actions | ✗ Reactive only | ✓Real-time emotional baseline |
| Individual emotional baseline | ✗ | ✗ | ✗ | ✓Per-person calibration |
| Pre-incident signal | ✗ | Partial | ✗ | ✓Anomaly scoring |
| No additional hardware | ✓ | ✓ | ✓ | ✓Existing cameras |
| SIEM alert integration | ✗ | ✓ | ✓ Native | ✓REST API / WebSocket |
| Air-gap compatible | ✓ | Partial | Partial | ✓Full on-premise |
See What Your Security Stack Is Missing.
Structured technical briefings for defence procurement, security leadership, and intelligence teams. NDA available. Air-gapped demo environment on request.
DEFENCE@CAVEFISH.CO.UK · CARDIFF, WALES · UK DATA RESIDENCY STANDARD