Investigate, using darknet and open-source tools and techniques, specific threat actors, groups, activities or assets. Research their darknet footprint, tactics, techniques, and procedures (TTPs) and victims to provide a summary of their activities and assess the threat posed to organizations and actionable threat intelligence which can be used to prevent future attacks.