SRIG's capabilities include providing full-spectrum Counterterrorism and Counterespionage services to U.S. government and corporate clients with global operations.
We deliver Threat and Actionable Intelligence products tailored to meet individual client’s requirements to ensure:
- Maximum survivability of Personnel & Facilities
- Safeguarding of Critical Infrastructure & Technologies
- Preservation of Operational Integrity
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
SRIG Capabilities TVA Brief
1. Surveillance Reconnaissance Intelligence Group
!
Introduction Brief
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
2. Bottom Line Up Front
We provide full-spectrum Counterterrorism and Counterespionage
services to U.S. government and corporate clients with global
operations. !
!
We deliver Threat and Actionable Intelligence products tailored to meet
individual client’s requirements to ensure:!
!
– Maximum survivability of Personnel & Facilities !
– Safeguarding of Critical Infrastructure & Technologies!
– Preservation of Operational Integrity
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
3. The Threat
Asymmetric warfare—attacking an adversary’s weaknesses with unexpected
or innovative means while avoiding his strengths—is as old as warfare itself… !
-LTG Patrick M. Hughes !
!
Since 9/11, the global environment has undergone and continues to
experience major change. Established powers have fallen, new ones
have risen increasing the number and scope of threats to America
both at home and abroad. !
!
Insurgents, terrorists, transnational criminal organizations, nation
states and their proxies exploit gaps in conventional policies
developed for the cold war era. These threats are better networked,
more adaptable, and increasingly empowered by cyberspace to find
new ways to recruit, train, finance, and operate.
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
4. Our Team
!
• Broad and diverse operational experience within US Special Operations
and Intelligence Community!
• Mastery of C4ISR!
• Unsurpassed understanding of global Human-Terrain!
• Rich experience in matters pertaining to National Security
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
5. Mission
Detect and Define the unseen threat…!
!
• We detect and define unseen threats and vulnerabilities to provide an
accurate disposition of our client’s operational environment!
• By providing actionable intelligence, we enable our clients to make
fact-based decisions that enhance awareness and security practices!
• We conduct collaborative technology discovery, coordinate research
and development activities and rapidly integrate new technology and
techniques to safeguard critical assets!
• We proactively identify and address problems before they become
conflicts!
• We create circumstances today that are essential for securing a safer
tomorrow
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
6. Our Approach
• We see early detection and neutralization of threats and vulnerabilities
as the key risk mitigation strategy!
• Our methodology is supported by cutting edge technology which
enhances our ability to conduct full-spectrum Counterterrorism &
Counterespionage operations !
• Our Threat & Vulnerability Assessment gives our client a three-
dimensional understanding of their operational environment!
• Our strategies are derived from latest Intelligence and Special
Operations TTPs!
– Direct Approach !
– Indirect Approach!
• We structure our teams to be agile and highly versatile which allows us
to maximize our capabilities while maintaining a small operational foot
print
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
7. Products and Services
Full-spectrum Counterterrorism & Counterespionage:!
• Initial Security Assessment!
• Threat Specific Assessments!
• Individual Protective
Measures!
• Management Consulting!
• Emergency Action Planning!
• Crisis Management!
• Follow-on Support!
– Situational updates!
– Strategic Planning!
– Training
• Early Indications and Warning!
• Force Protection!
– Personnel!
– Facilities!
– Critical Infrastructure!
– Technologies!– Operational Integrity!• Security Apparatus
Modernization!
– Synchronization!
– Regional/threat specific!
• Operational Planning and
Execution Support
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
8. Threat Intelligence Products
Cyber Security:!
• Targeting and Exploitation
of Human Factor!
• Threat detection programs
identify Insider activities
on our client’s networks !
• CI collection and analysis
increases understanding
of cyber threats and
speeds implementations of
countermeasures !
• Offensive operations
detect and identify
adversarial tactics for
isolation and neutralization
Insider Threat:!
• Awareness and Training !
• Anomaly-based detection !
• Analysis of Information
Technology, Auditing, and
Monitoring.!
• Foreign Travel, Contact
Reporting and Analysis !
• Personnel Security,
Evaluation, Analysis, and
Reporting!
• Security Incident
Reporting and Evaluation,
Proactive Initiative
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
9. Please contact me with your questions.
!
Brian Keith!
Director - Sales & Marketing!
SRIG Solutions, LLC!
515.720.2031!
info@srig-s.com!
www.srigsolutions.com !
Contact Information
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013