Surveillance Reconnaissance Intelligence Group Introduction Brief Proprietary S urveillance R econnaissance I ntelligence G roup 2013
Surveillance Reconnaissance Intelligence Group
!Introduction Brief
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Bottom Line Up Front
We provide full-spectrum Counterterrorism and Counterespionage services to U.S. government and corporate clients with global operations. !!We deliver Threat and Actionable Intelligence products tailored to meet individual client’s requirements to ensure:!!
– Maximum survivability of Personnel & Facilities !– Safeguarding of Critical Infrastructure & Technologies!– Preservation of Operational Integrity
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
The Threat
Asymmetric warfare—attacking an adversary’s weaknesses with unexpected or innovative means while avoiding his strengths—is as old as warfare itself… !
-LTG Patrick M. Hughes !!Since 9/11, the global environment has undergone and continues to experience major change. Established powers have fallen, new ones have risen increasing the number and scope of threats to America both at home and abroad. ! !Insurgents, terrorists, transnational criminal organizations, nation states and their proxies exploit gaps in conventional policies developed for the cold war era. These threats are better networked, more adaptable, and increasingly empowered by cyberspace to find new ways to recruit, train, finance, and operate.
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Our Team
!• Broad and diverse operational experience within US Special Operations
and Intelligence Community!• Mastery of C4ISR!• Unsurpassed understanding of global Human-Terrain!• Rich experience in matters pertaining to National Security
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Mission
Detect and Define the unseen threat…!!
• We detect and define unseen threats and vulnerabilities to provide an accurate disposition of our client’s operational environment!
• By providing actionable intelligence, we enable our clients to make fact-based decisions that enhance awareness and security practices!
• We conduct collaborative technology discovery, coordinate research and development activities and rapidly integrate new technology and techniques to safeguard critical assets!
• We proactively identify and address problems before they become conflicts!
• We create circumstances today that are essential for securing a safer tomorrow
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Our Approach
• We see early detection and neutralization of threats and vulnerabilities as the key risk mitigation strategy!
• Our methodology is supported by cutting edge technology which enhances our ability to conduct full-spectrum Counterterrorism & Counterespionage operations !
• Our Threat & Vulnerability Assessment gives our client a three-dimensional understanding of their operational environment!
• Our strategies are derived from latest Intelligence and Special Operations TTPs!
– Direct Approach !– Indirect Approach!
• We structure our teams to be agile and highly versatile which allows us to maximize our capabilities while maintaining a small operational foot print
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Products and Services
Full-spectrum Counterterrorism & Counterespionage:!
• Initial Security Assessment!• Threat Specific Assessments!• Individual Protective
Measures!• Management Consulting!• Emergency Action Planning!• Crisis Management!• Follow-on Support!
– Situational updates!– Strategic Planning!– Training
• Early Indications and Warning!
• Force Protection!
– Personnel!– Facilities!
– Critical Infrastructure!
– Technologies!– Operational Integrity!
• Security Apparatus Modernization!
– Synchronization!
– Regional/threat specific!
• Operational Planning and Execution Support
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Threat Intelligence Products
Cyber Security:!• Targeting and Exploitation
of Human Factor!• Threat detection programs
identify Insider activities on our client’s networks !
• CI collection and analysis increases understanding of cyber threats and speeds implementations of countermeasures !
• Offensive operations detect and identify adversarial tactics for isolation and neutralization
Insider Threat:!• Awareness and Training !• Anomaly-based detection !• Analysis of Information
Technology, Auditing, and Monitoring.!
• Foreign Travel, Contact Reporting and Analysis !
• Personnel Security, Evaluation, Analysis, and Reporting!
• Security Incident Reporting and Evaluation, Proactive Initiative
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Please contact me with your questions.
!Brian Keith!
Director - Sales & Marketing!SRIG Solutions, LLC!
www.srigsolutions.com !
Contact Information
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013