INTELLIGENCE

NSR's proven Operational Intelligence model is integrated and modular,  providing end-to-end services thath  enable customers  to operate all the layers required for a working Intelligence solution:

 

  • Recruitment 

  • Training 

  • Maintenance

  • Support

FORMING AN INTELLIGENCE UNIT

Collect

Collect information on specific targets by predefined rules.

Respond

Respond to triggers, gathering specific information i to bring events to desired resolution.

Gather

Collect all needed information using SIGINT, OSINT and VISINT technologies via on-the-ground teams.

Manage

Continuous intelligence management internally and out of the country

press to zoom
press to zoom
press to zoom
press to zoom

THE DESK

Radiation Control

 

Measures radioactivity levels and detects gamma and beta particles via Geiger counter.

 

NSR's proven Operational Intelligence model is integrated and modular,  providing end-to-end services thath  enable customers  to operate all the layers required for a working Intelligence solution:

 

  • Recruitment 

  • Training 

  • Maintenance

  • Support

FORMING AN INTELLIGENCE UNIT

Collect

Collect information on specific targets by predefined rules.

Respond

Respond to triggers, gathering specific information i to bring events to desired resolution.

Gather

Collect all needed information using SIGINT, OSINT and VISINT technologies via on-the-ground teams.

Manage

Continuous intelligence management internally and out of the country

THE DESK

Link Analysis

Link Analysis of objects and relationships is implemented to uncover relevant information.

Intelligence Lifecycle

The desk manages the unit's full lifecycle: from analysis, through planning, to processing,

Object Mapping

The desk maps objects of interest and groups them according to relationships

OSINT

Multimedia Support
ID Management
  • Complete profile editor

  • Multiple social accounts, 

  • Link multiple avatars 

  • Instantly access information 

Control Interface
  • Secure desktop environment 

  • Complete anonymization 

  • Open for 3rd party apps

  • Secure data transfer  

Virtual Agents

An investigation tool that generates social network avatars tailored to draw in targets and extract information.

SIGINT

Mobile Tracking
  • Real time & historic analysis

  • View all mobile phone communication  in area 

  • Find links and connections to black lists numbers

  • Analyze behavior patterns

Strategic System
Mapping

A mapping tool that utilizes web-based  and cellular information to identify real-world location of objects of interest and their real-world interactions.

Jam/Intercept

A range of data and communications interception and jamming tools.

Passive & Active& WIFI Interception
Passive & Active& WIFI Interception

press to zoom
Interception for Mobile Units
Interception for Mobile Units

press to zoom
Command & Control
Command & Control

press to zoom
Passive & Active& WIFI Interception
Passive & Active& WIFI Interception

press to zoom
1/5

CYBER CENTER

Cyber Center

Design and create an operable Cyber Center with full hacking capabilities, including end-to-end  HUMINT and technical acquisition & training.

Covert Phone/PC Cloning

Fully capable of managing the cloning process end-to-end:

 

  • Delivery - methods to Infect target 

  • Trojan - trojan that runs on the target 

  • Transport – comm. to leak data 

  • C&C - centralitarget management 

  • Analytics - centralized Intelligence 

Offensive/Defensive Cyber
  • Cyber Espionage

  • Cyber Terrorism

  • Hacking

  • Malware

  • Email Threats

  • Phishing

COVERT SOLUTIONS

Covert Vehicles

•    Cameras
•    Audio Pickup
•    C&C Centers

Covert Sensors

•    Cameras
•    Audio Pickup
•    Motion Sensors
•    Thermal Sensors

 
 
  • File sharing

  • Social Networks

  • Voice over IP

  • Mobile messaging

 
  • Locations indoor & outdoor

  • All comm. types decryption

  • Speed of movement detection

  • Links between subscribers

  • Behavior patterns analysis