Top Banner
You need to rely on proven methods of gathering intelligence to better gauge your security posture against potential adversaries both financially and ideologically motivated. No Hacking No Deception Confidentiality We gauge your current and ongoing posture against adversaries without intrusion. This helps you understand how the information already available could be weaponized without risking detection. We do not target you and your entourage using honeypots or social engineering to force you into making a mistake. We focus on reconnaissance as most bad actors do to not elicit suspicion. Our people work under strict confidentiality agreements. Information is compartmentalized on a need to know basis. Swiss neutrality and privacy laws. TacOps leverages the experience and expertise of former operatives to produce human intelligence from publicly available datasets as well as compromised information. Research Data Tradecraft Our analysts are the core of the engine, they leverage multiple tools and sources to collect, process and analyze data based on your intelligence priorities. Our reconnaissance work is supported by high fidelity datasets covering geolocation, PIIs, social media, criminal records, underground communities as well as leaked media files. Our case officers have produced briefings for governments, corporations and national security agencies. Intelligence requires critical thinking skills and expertise developed over years of engagement. After establishing your intelligence requirements and collection targets, a Case Officer is assigned to your report. Leveraging multiple paid datasets and OSINT tools, our team compiles and shares preliminary findings with you before further research is performed. INDIVIDUAL You are a high net worth individual, a public figure or an executive. You are worried about the physical and cyber risks associated with your digital exposure. INSTITUTIONAL You are an organization concerned with external threats and your staff potentially being used as internal access points. EXPOSURE REPORTS www.tacops-intel.com [email protected] Strictly confidential
2

TacOps Exposure Reports - Eisa Smart

Oct 15, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: TacOps Exposure Reports - Eisa Smart

You need to rely on proven methods of gathering intelligence to better gauge your security posture against potential adversaries both financially and ideologically motivated.

No Hacking

No Deception Confidentiality

We gauge your current and ongoing posture against adversaries without intrusion. This helps you understand how the information already available could be weaponized without risking

detection.

We do not target you and your entourage using honeypots or social engineering to force you into making

a mistake. We focus on reconnaissance as most bad actors

do to not elicit suspicion.

Our people work under strict confidentiality agreements.

Information is compartmentalized on a need to know basis.

Swiss neutrality and privacy laws.

TacOps leverages the experience and expertise of former operatives to produce human intelligence from publicly available datasets as well as compromised information.

Research

Data Tradecraft

Our analysts are the core of the engine, they leverage multiple tools and sources to collect, process and

analyze data based on your intelligence priorities.

Our reconnaissance work is supported by high fidelity datasets covering geolocation, PIIs, social

media, criminal records, underground communities as well as

leaked media files.

Our case officers have produced briefings for governments,

corporations and national security agencies.

Intelligence requires critical thinking skills and expertise developed over

years of engagement.

After establishing your intelligence requirements and collection targets, a Case Officer is assigned to your report. Leveraging multiple paid datasets and OSINT tools, our team compiles and shares preliminary findings with you before further research is performed.

INDIVIDUAL

You are a high net worth individual, a public figure or an executive. You are worried about the physical and cyber

risks associated with your digital exposure.

INSTITUTIONAL

You are an organization concerned with external threats and your staff potentially being used as internal access

points.

EXPOSURE REPORTS

www.tacops-intel.com [email protected] Strictly confidential

Page 2: TacOps Exposure Reports - Eisa Smart

Final exposure report may include:

Vulnerability Scenarios

Access Points Pattern of Life

Our experts simulate a number of scenarios that adversaries could

potentially exploit through impersonation, cyber attacks,

surveillance or social engineering. This includes an assessment of

negative cyber and physical outcomes and their likelihood.

Research is conducted to identify individuals who could provide

access or entry into personal and business affairs whether physically

or virtually. This includes sample data that could potentially be used if access points

are leveraged against you.

An in-depth review of available data, public or compromised, to facilitate a

pattern of life analysis. Known locations, work and event

agendas, travel plans, political and religious affiliation as well as interests can all be used to

anticipate future behavior by a malicious adversary.

Sources of Intelligence

Physical Security: identification and persistent monitoring if required. Social Media: direct and indirect exposure of client, relatives and associates. Reputational Risk: exposure of sensitive information, fake postings and profiles, website spoofing. Disclosure of personal information: PIIs of client, relatives and associates including personal financial details. Disclosure of business information: incorporation, ownership and directorship as well as strategic plans.

Extensive review of all datasets including multiple social media platforms to produce a wealth of threat information. Threats are detailed and contextualized, and further capability review informs mitigation plan. The experience and expertise of our former operatives working for governments, corporations and national security agencies gives them an unparalleled ability to detect and face a very wide range of threat actors and groups (including organized crime, violent extremists, activists, state actors)

Threat Rankings Threat Reporting

Threat Context Mitigation

Recommendations: Each report concludes with strategic and tactical recommendations to mitigate current treats and reduce future exposure. Follow up: Further investigative support and persistent monitoring can be requested for any specific cases of insider threats, security lapses, supply chain issues, fraud/theft or business intelligence needs. On the ground: Investigations may require on field deployment; such resources are available on demand. All reports can be enhanced and updated on a monthly, quarterly and yearly basis

www.tacops-intel.com [email protected] Strictly confidential