INTELLIGENCE
NSR's proven Operational Intelligence model is integrated and modular, providing end-to-end services thath enable customers to operate all the layers required for a working Intelligence solution:
-
Recruitment
-
Training
-
Maintenance
-
Support

FORMING AN INTELLIGENCE UNIT
Collect
Collect information on specific targets by predefined rules.
Respond
Respond to triggers, gathering specific information ito bring events to desired resolution.
Gather
Collect all needed information using SIGINT, OSINT and VISINT technologies via on-the-ground teams.
Manage
Continuous intelligence management internally and out of the country




THE DESK
Radiation Control
Measures radioactivity levels and detects gamma and beta particles via Geiger counter.
NSR's proven Operational Intelligence model is integrated and modular, providing end-to-end services thath enable customers to operate all the layers required for a working Intelligence solution:
-
Recruitment
-
Training
-
Maintenance
-
Support

FORMING AN INTELLIGENCE UNIT
Collect
Collect information on specific targets by predefined rules.
Respond
Respond to triggers, gathering specific information ito bring events to desired resolution.
Gather
Collect all needed information using SIGINT, OSINT and VISINT technologies via on-the-ground teams.
Manage
Continuous intelligence management internally and out of the country




THE DESK



Link Analysis
Link Analysis of objects and relationships is implemented to uncover relevant information.
Intelligence Lifecycle
The desk manages the unit's full lifecycle: from analysis, through planning, to processing,
Object Mapping
The desk maps objects of interest and groups them according to relationships
OSINT




Multimedia Support
ID Management
-
Complete profile editor
-
Multiple social accounts,
-
Link multiple avatars
-
Instantly access information
Control Interface
-
Secure desktop environment
-
Complete anonymization
-
Open for 3rd party apps
-
Secure data transfer
Virtual Agents
An investigation tool that generates social network avatars tailored to draw in targets and extract information.
SIGINT



Mobile Tracking
-
Real time & historic analysis
-
View all mobile phone communication in area
-
Find links and connections to black lists numbers
-
Analyze behavior patterns
Strategic System
Mapping
A mapping tool that utilizes web-based and cellular information to identify real-world location of objects of interest and their real-world interactions.
Jam/Intercept
A range of data and communications interception and jamming tools.




CYBER CENTER



Cyber Center
Design and create an operable Cyber Center with full hacking capabilities, including end-to-end HUMINT and technical acquisition & training.
Covert Phone/PC Cloning
Fully capable of managing the cloning process end-to-end:
-
Delivery - methods to Infect target
-
Trojan - trojan that runs on the target
-
Transport – comm. to leak data
-
C&C - centralitarget management
-
Analytics - centralized Intelligence
Offensive/Defensive Cyber
-
Cyber Espionage
-
Cyber Terrorism
-
Hacking
-
Malware
-
Email Threats
-
Phishing
COVERT SOLUTIONS

Covert Vehicles
• Cameras
• Audio Pickup
• C&C Centers

Covert Sensors
• Cameras
• Audio Pickup
• Motion Sensors
• Thermal Sensors
-
File sharing
-
Social Networks
-
Voice over IP
-
Mobile messaging
-
Locations indoor & outdoor
-
All comm. types decryption
-
Speed of movement detection
-
Links between subscribers
-
Behavior patterns analysis