You need to rely on proven methods of gathering intelligence to better gauge your security posture against potential adversaries both financially and ideologically motivated.
No Hacking
No Deception Confidentiality
We gauge your current and ongoing posture against adversaries without intrusion. This helps you understand how the information already available could be weaponized without risking
detection.
We do not target you and your entourage using honeypots or social engineering to force you into making
a mistake. We focus on reconnaissance as most bad actors
do to not elicit suspicion.
Our people work under strict confidentiality agreements.
Information is compartmentalized on a need to know basis.
Swiss neutrality and privacy laws.
TacOps leverages the experience and expertise of former operatives to produce human intelligence from publicly available datasets as well as compromised information.
Research
Data Tradecraft
Our analysts are the core of the engine, they leverage multiple tools and sources to collect, process and
analyze data based on your intelligence priorities.
Our reconnaissance work is supported by high fidelity datasets covering geolocation, PIIs, social
media, criminal records, underground communities as well as
leaked media files.
Our case officers have produced briefings for governments,
corporations and national security agencies.
Intelligence requires critical thinking skills and expertise developed over
years of engagement.
After establishing your intelligence requirements and collection targets, a Case Officer is assigned to your report. Leveraging multiple paid datasets and OSINT tools, our team compiles and shares preliminary findings with you before further research is performed.
INDIVIDUAL
You are a high net worth individual, a public figure or an executive. You are worried about the physical and cyber
risks associated with your digital exposure.
INSTITUTIONAL
You are an organization concerned with external threats and your staff potentially being used as internal access
points.
EXPOSURE REPORTS
www.tacops-intel.com [email protected] Strictly confidential
Final exposure report may include:
Vulnerability Scenarios
Access Points Pattern of Life
Our experts simulate a number of scenarios that adversaries could
potentially exploit through impersonation, cyber attacks,
surveillance or social engineering. This includes an assessment of
negative cyber and physical outcomes and their likelihood.
Research is conducted to identify individuals who could provide
access or entry into personal and business affairs whether physically
or virtually. This includes sample data that could potentially be used if access points
are leveraged against you.
An in-depth review of available data, public or compromised, to facilitate a
pattern of life analysis. Known locations, work and event
agendas, travel plans, political and religious affiliation as well as interests can all be used to
anticipate future behavior by a malicious adversary.
Sources of Intelligence
Physical Security: identification and persistent monitoring if required. Social Media: direct and indirect exposure of client, relatives and associates. Reputational Risk: exposure of sensitive information, fake postings and profiles, website spoofing. Disclosure of personal information: PIIs of client, relatives and associates including personal financial details. Disclosure of business information: incorporation, ownership and directorship as well as strategic plans.
Extensive review of all datasets including multiple social media platforms to produce a wealth of threat information. Threats are detailed and contextualized, and further capability review informs mitigation plan. The experience and expertise of our former operatives working for governments, corporations and national security agencies gives them an unparalleled ability to detect and face a very wide range of threat actors and groups (including organized crime, violent extremists, activists, state actors)
Threat Rankings Threat Reporting
Threat Context Mitigation
Recommendations: Each report concludes with strategic and tactical recommendations to mitigate current treats and reduce future exposure. Follow up: Further investigative support and persistent monitoring can be requested for any specific cases of insider threats, security lapses, supply chain issues, fraud/theft or business intelligence needs. On the ground: Investigations may require on field deployment; such resources are available on demand. All reports can be enhanced and updated on a monthly, quarterly and yearly basis
www.tacops-intel.com [email protected] Strictly confidential