top of page

INTELLIGENCE

NSR's proven Operational Intelligence model is integrated and modular,  providing end-to-end services thath  enable customers  to operate all the layers required for a working Intelligence solution:

 

  • Recruitment 

  • Training 

  • Maintenance

  • Support

FORMING AN INTELLIGENCE UNIT

Collect

Collect information on specific targets by predefined rules.

Respond

Respond to triggers, gathering specific information ito bring events to desired resolution.

Gather

Collect all needed information using SIGINT, OSINT and VISINT technologies via on-the-ground teams.

Manage

Continuous intelligence management internally and out of the country

THE DESK

Radiation Control

 

Measures radioactivity levels and detects gamma and beta particles via Geiger counter.

FORMING A UNIT

NSR's proven Operational Intelligence model is integrated and modular,  providing end-to-end services thath  enable customers  to operate all the layers required for a working Intelligence solution:

 

  • Recruitment 

  • Training 

  • Maintenance

  • Support

FORMING AN INTELLIGENCE UNIT

Collect

Collect information on specific targets by predefined rules.

Respond

Respond to triggers, gathering specific information ito bring events to desired resolution.

Gather

Collect all needed information using SIGINT, OSINT and VISINT technologies via on-the-ground teams.

Manage

Continuous intelligence management internally and out of the country

THE DESK

Link Analysis

Link Analysis of objects and relationships is implemented to uncover relevant information.

Intelligence Lifecycle

The desk manages the unit's full lifecycle: from analysis, through planning, to processing,

Object Mapping

The desk maps objects of interest and groups them according to relationships

OSINT

Multimedia Support
Profiler 
  • Complete profile collector

  • Multiple SM and IM exposure 

  • Link analysis 

  • Uncover hidden acounts and expose illigeal activities 

Control Interface
  • Secure desktop environment 

  • Complete anonymization 

  • Open for 3rd party apps

  • Secure data transfer  

Virtual ID

An investigation tool that generates social network abilities powered by AI and tailored to draw in targets and extract information.

SIGINT

Mobile Tracking
  • Real time & historic analysis

  • View all mobile phone communication  in area 

  • Find links and connections to black lists numbers

  • Analyze behavior patterns

Strategic System
Mapping

A mapping tool that utilizes web-based  and cellular information to identify real-world location of objects of interest and their real-world interactions.

Jam/Intercept

A range of data and communications interception and jamming tools.

CYBER CENTER

Cyber Center

Design and create an operable Cyber Center with full hacking capabilities, including end-to-end  HUMINT and technical acquisition & training.

Defensive Cyber Protection:
  • Cyber Espionage

  • Cyber Terrorism

  • Hacking

  • Malware

  • Email Threats

  • Phishing

COVERT SOLUTIONS

Covert Vehicles

•    Cameras
•    Audio Pickup
•    C&C Centers

Covert Sensors

•    Cameras
•    Audio Pickup
•    Motion Sensors
•    Thermal Sensors

THE DESK
OSINT
  • File sharing

  • Social Networks

  • Voice over IP

  • Mobile messaging

SIGINT
  • Locations indoor & outdoor

  • All comm. types decryption

  • Speed of movement detection

  • Links between subscribers

  • Behavior patterns analysis

CYBER CENTER
COVERT SOLUTIONS
bottom of page