SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Surveillance Reconnaissance Intelligence Group
!
Introduction Brief
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Bottom Line Up Front
We provide full-spectrum Counterterrorism and Counterespionage
services to U.S. government and corporate clients with global
operations. !
!
We deliver Threat and Actionable Intelligence products tailored to meet
individual client’s requirements to ensure:!
!
– Maximum survivability of Personnel & Facilities !
– Safeguarding of Critical Infrastructure & Technologies!
– Preservation of Operational Integrity
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
The Threat
Asymmetric warfare—attacking an adversary’s weaknesses with unexpected
or innovative means while avoiding his strengths—is as old as warfare itself… !
-LTG Patrick M. Hughes !
!
Since 9/11, the global environment has undergone and continues to
experience major change. Established powers have fallen, new ones
have risen increasing the number and scope of threats to America
both at home and abroad. !
!
Insurgents, terrorists, transnational criminal organizations, nation
states and their proxies exploit gaps in conventional policies
developed for the cold war era. These threats are better networked,
more adaptable, and increasingly empowered by cyberspace to find
new ways to recruit, train, finance, and operate.
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Our Team
!
• Broad and diverse operational experience within US Special Operations
and Intelligence Community!
• Mastery of C4ISR!
• Unsurpassed understanding of global Human-Terrain!
• Rich experience in matters pertaining to National Security
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Mission
Detect and Define the unseen threat…!
!
• We detect and define unseen threats and vulnerabilities to provide an
accurate disposition of our client’s operational environment!
• By providing actionable intelligence, we enable our clients to make
fact-based decisions that enhance awareness and security practices!
• We conduct collaborative technology discovery, coordinate research
and development activities and rapidly integrate new technology and
techniques to safeguard critical assets!
• We proactively identify and address problems before they become
conflicts!
• We create circumstances today that are essential for securing a safer
tomorrow
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Our Approach
• We see early detection and neutralization of threats and vulnerabilities
as the key risk mitigation strategy!
• Our methodology is supported by cutting edge technology which
enhances our ability to conduct full-spectrum Counterterrorism &
Counterespionage operations !
• Our Threat & Vulnerability Assessment gives our client a three-
dimensional understanding of their operational environment!
• Our strategies are derived from latest Intelligence and Special
Operations TTPs!
– Direct Approach !
– Indirect Approach!
• We structure our teams to be agile and highly versatile which allows us
to maximize our capabilities while maintaining a small operational foot
print
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Products and Services
Full-spectrum Counterterrorism & Counterespionage:!
• Initial Security Assessment!
• Threat Specific Assessments!
• Individual Protective
Measures!
• Management Consulting!
• Emergency Action Planning!
• Crisis Management!
• Follow-on Support!
– Situational updates!
– Strategic Planning!
– Training
• Early Indications and Warning!
• Force Protection!
– Personnel!
– Facilities!
– Critical Infrastructure!
– Technologies!– Operational Integrity!• Security Apparatus
Modernization!
– Synchronization!
– Regional/threat specific!
• Operational Planning and
Execution Support
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Threat Intelligence Products
Cyber Security:!
• Targeting and Exploitation
of Human Factor!
• Threat detection programs
identify Insider activities
on our client’s networks !
• CI collection and analysis
increases understanding
of cyber threats and
speeds implementations of
countermeasures !
• Offensive operations
detect and identify
adversarial tactics for
isolation and neutralization
Insider Threat:!
• Awareness and Training !
• Anomaly-based detection !
• Analysis of Information
Technology, Auditing, and
Monitoring.!
• Foreign Travel, Contact
Reporting and Analysis !
• Personnel Security,
Evaluation, Analysis, and
Reporting!
• Security Incident
Reporting and Evaluation,
Proactive Initiative
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
Please contact me with your questions.
!
Brian Keith!
Director - Sales & Marketing!
SRIG Solutions, LLC!
515.720.2031!
info@srig-s.com!
www.srigsolutions.com !
 






Contact Information
Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013

Weitere ähnliche Inhalte

Andere mochten auch (9)

אלכוהול
אלכוהולאלכוהול
אלכוהול
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case Study
 
Stuxnet dc9723
Stuxnet dc9723Stuxnet dc9723
Stuxnet dc9723
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 
Espionage (m)
Espionage (m)Espionage (m)
Espionage (m)
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
 

Kürzlich hochgeladen

Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 

Kürzlich hochgeladen (20)

Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 

SRIG Capabilities TVA Brief

  • 1. Surveillance Reconnaissance Intelligence Group ! Introduction Brief Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 2. Bottom Line Up Front We provide full-spectrum Counterterrorism and Counterespionage services to U.S. government and corporate clients with global operations. ! ! We deliver Threat and Actionable Intelligence products tailored to meet individual client’s requirements to ensure:! ! – Maximum survivability of Personnel & Facilities ! – Safeguarding of Critical Infrastructure & Technologies! – Preservation of Operational Integrity Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 3. The Threat Asymmetric warfare—attacking an adversary’s weaknesses with unexpected or innovative means while avoiding his strengths—is as old as warfare itself… ! -LTG Patrick M. Hughes ! ! Since 9/11, the global environment has undergone and continues to experience major change. Established powers have fallen, new ones have risen increasing the number and scope of threats to America both at home and abroad. ! ! Insurgents, terrorists, transnational criminal organizations, nation states and their proxies exploit gaps in conventional policies developed for the cold war era. These threats are better networked, more adaptable, and increasingly empowered by cyberspace to find new ways to recruit, train, finance, and operate. Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 4. Our Team ! • Broad and diverse operational experience within US Special Operations and Intelligence Community! • Mastery of C4ISR! • Unsurpassed understanding of global Human-Terrain! • Rich experience in matters pertaining to National Security Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 5. Mission Detect and Define the unseen threat…! ! • We detect and define unseen threats and vulnerabilities to provide an accurate disposition of our client’s operational environment! • By providing actionable intelligence, we enable our clients to make fact-based decisions that enhance awareness and security practices! • We conduct collaborative technology discovery, coordinate research and development activities and rapidly integrate new technology and techniques to safeguard critical assets! • We proactively identify and address problems before they become conflicts! • We create circumstances today that are essential for securing a safer tomorrow Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 6. Our Approach • We see early detection and neutralization of threats and vulnerabilities as the key risk mitigation strategy! • Our methodology is supported by cutting edge technology which enhances our ability to conduct full-spectrum Counterterrorism & Counterespionage operations ! • Our Threat & Vulnerability Assessment gives our client a three- dimensional understanding of their operational environment! • Our strategies are derived from latest Intelligence and Special Operations TTPs! – Direct Approach ! – Indirect Approach! • We structure our teams to be agile and highly versatile which allows us to maximize our capabilities while maintaining a small operational foot print Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 7. Products and Services Full-spectrum Counterterrorism & Counterespionage:! • Initial Security Assessment! • Threat Specific Assessments! • Individual Protective Measures! • Management Consulting! • Emergency Action Planning! • Crisis Management! • Follow-on Support! – Situational updates! – Strategic Planning! – Training • Early Indications and Warning! • Force Protection! – Personnel! – Facilities! – Critical Infrastructure! – Technologies!– Operational Integrity!• Security Apparatus Modernization! – Synchronization! – Regional/threat specific! • Operational Planning and Execution Support Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 8. Threat Intelligence Products Cyber Security:! • Targeting and Exploitation of Human Factor! • Threat detection programs identify Insider activities on our client’s networks ! • CI collection and analysis increases understanding of cyber threats and speeds implementations of countermeasures ! • Offensive operations detect and identify adversarial tactics for isolation and neutralization Insider Threat:! • Awareness and Training ! • Anomaly-based detection ! • Analysis of Information Technology, Auditing, and Monitoring.! • Foreign Travel, Contact Reporting and Analysis ! • Personnel Security, Evaluation, Analysis, and Reporting! • Security Incident Reporting and Evaluation, Proactive Initiative Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 9. Please contact me with your questions. ! Brian Keith! Director - Sales & Marketing! SRIG Solutions, LLC! 515.720.2031! info@srig-s.com! www.srigsolutions.com !   
 
 
 Contact Information Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013