INTELLIGENCE

NSR's proven Operational Intelligence model is integrated and modular,  providing end-to-end services thath  enable customers  to operate all the layers required for a working Intelligence solution:

 

  • Recruitment 

  • Training 

  • Maintenance

  • Support

FORMING AN INTELLIGENCE UNIT

Collect

Collect information on specific targets by predefined rules.

Respond

Respond to triggers, gathering specific information i to bring events to desired resolution.

Gather

Collect all needed information using SIGINT, OSINT and VISINT technologies via on-the-ground teams.

Manage

Continuous intelligence management internally and out of the country

Show More

THE DESK

Radiation Control

 

Measures radioactivity levels and detects gamma and beta particles via Geiger counter.

 

NSR's proven Operational Intelligence model is integrated and modular,  providing end-to-end services thath  enable customers  to operate all the layers required for a working Intelligence solution:

 

  • Recruitment 

  • Training 

  • Maintenance

  • Support

FORMING AN INTELLIGENCE UNIT

Collect

Collect information on specific targets by predefined rules.

Respond

Respond to triggers, gathering specific information i to bring events to desired resolution.

Gather

Collect all needed information using SIGINT, OSINT and VISINT technologies via on-the-ground teams.

Manage

Continuous intelligence management internally and out of the country

Show More

THE DESK

Show More
Link Analysis

Link Analysis of objects and relationships is implemented to uncover relevant information.

Intelligence Lifecycle

The desk manages the unit's full lifecycle: from analysis, through planning, to processing,

Object Mapping

The desk maps objects of interest and groups them according to relationships

OSINT

Show More
Multimedia Support
ID Management
  • Complete profile editor

  • Multiple social accounts, 

  • Link multiple avatars 

  • Instantly access information 

Control Interface
  • Secure desktop environment 

  • Complete anonymization 

  • Open for 3rd party apps

  • Secure data transfer  

Virtual Agents

An investigation tool that generates social network avatars tailored to draw in targets and extract information.

SIGINT

Show More
Mobile Tracking
  • Real time & historic analysis

  • View all mobile phone communication  in area 

  • Find links and connections to black lists numbers

  • Analyze behavior patterns

Strategic System
Mapping

A mapping tool that utilizes web-based  and cellular information to identify real-world location of objects of interest and their real-world interactions.

Jam/Intercept

A range of data and communications interception and jamming tools.

CYBER CENTER

Show More
Cyber Center

Design and create an operable Cyber Center with full hacking capabilities, including end-to-end  HUMINT and technical acquisition & training.

Covert Phone/PC Cloning

Fully capable of managing the cloning process end-to-end:

 

  • Delivery - methods to Infect target 

  • Trojan - trojan that runs on the target 

  • Transport – comm. to leak data 

  • C&C - centralitarget management 

  • Analytics - centralized Intelligence 

Offensive/Defensive Cyber
  • Cyber Espionage

  • Cyber Terrorism

  • Hacking

  • Malware

  • Email Threats

  • Phishing

COVERT SOLUTIONS

Covert Vehicles

•    Cameras
•    Audio Pickup
•    C&C Centers

Covert Sensors

•    Cameras
•    Audio Pickup
•    Motion Sensors
•    Thermal Sensors

 
 
  • File sharing

  • Social Networks

  • Voice over IP

  • Mobile messaging

 
  • Locations indoor & outdoor

  • All comm. types decryption

  • Speed of movement detection

  • Links between subscribers

  • Behavior patterns analysis

 
 

© 2016 NSR GROUP

Interception for Mobile Units