Your SlideShare is downloading. ×
0
SRIG Capabilities TVA Brief
SRIG Capabilities TVA Brief
SRIG Capabilities TVA Brief
SRIG Capabilities TVA Brief
SRIG Capabilities TVA Brief
SRIG Capabilities TVA Brief
SRIG Capabilities TVA Brief
SRIG Capabilities TVA Brief
SRIG Capabilities TVA Brief
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

SRIG Capabilities TVA Brief

700

Published on

SRIG's capabilities include providing full-spectrum Counterterrorism and Counterespionage services to U.S. government and corporate clients with global operations. …

SRIG's capabilities include providing full-spectrum Counterterrorism and Counterespionage services to U.S. government and corporate clients with global operations.

We deliver Threat and Actionable Intelligence products tailored to meet individual client’s requirements to ensure:

- Maximum survivability of Personnel & Facilities
- Safeguarding of Critical Infrastructure & Technologies
- Preservation of Operational Integrity

Published in: Business, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
700
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
1
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Surveillance Reconnaissance Intelligence Group ! Introduction Brief Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 2. Bottom Line Up Front We provide full-spectrum Counterterrorism and Counterespionage services to U.S. government and corporate clients with global operations. ! ! We deliver Threat and Actionable Intelligence products tailored to meet individual client’s requirements to ensure:! ! – Maximum survivability of Personnel & Facilities ! – Safeguarding of Critical Infrastructure & Technologies! – Preservation of Operational Integrity Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 3. The Threat Asymmetric warfare—attacking an adversary’s weaknesses with unexpected or innovative means while avoiding his strengths—is as old as warfare itself… ! -LTG Patrick M. Hughes ! ! Since 9/11, the global environment has undergone and continues to experience major change. Established powers have fallen, new ones have risen increasing the number and scope of threats to America both at home and abroad. ! ! Insurgents, terrorists, transnational criminal organizations, nation states and their proxies exploit gaps in conventional policies developed for the cold war era. These threats are better networked, more adaptable, and increasingly empowered by cyberspace to find new ways to recruit, train, finance, and operate. Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 4. Our Team ! • Broad and diverse operational experience within US Special Operations and Intelligence Community! • Mastery of C4ISR! • Unsurpassed understanding of global Human-Terrain! • Rich experience in matters pertaining to National Security Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 5. Mission Detect and Define the unseen threat…! ! • We detect and define unseen threats and vulnerabilities to provide an accurate disposition of our client’s operational environment! • By providing actionable intelligence, we enable our clients to make fact-based decisions that enhance awareness and security practices! • We conduct collaborative technology discovery, coordinate research and development activities and rapidly integrate new technology and techniques to safeguard critical assets! • We proactively identify and address problems before they become conflicts! • We create circumstances today that are essential for securing a safer tomorrow Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 6. Our Approach • We see early detection and neutralization of threats and vulnerabilities as the key risk mitigation strategy! • Our methodology is supported by cutting edge technology which enhances our ability to conduct full-spectrum Counterterrorism & Counterespionage operations ! • Our Threat & Vulnerability Assessment gives our client a three- dimensional understanding of their operational environment! • Our strategies are derived from latest Intelligence and Special Operations TTPs! – Direct Approach ! – Indirect Approach! • We structure our teams to be agile and highly versatile which allows us to maximize our capabilities while maintaining a small operational foot print Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 7. Products and Services Full-spectrum Counterterrorism & Counterespionage:! • Initial Security Assessment! • Threat Specific Assessments! • Individual Protective Measures! • Management Consulting! • Emergency Action Planning! • Crisis Management! • Follow-on Support! – Situational updates! – Strategic Planning! – Training • Early Indications and Warning! • Force Protection! – Personnel! – Facilities! – Critical Infrastructure! – Technologies!– Operational Integrity!• Security Apparatus Modernization! – Synchronization! – Regional/threat specific! • Operational Planning and Execution Support Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 8. Threat Intelligence Products Cyber Security:! • Targeting and Exploitation of Human Factor! • Threat detection programs identify Insider activities on our client’s networks ! • CI collection and analysis increases understanding of cyber threats and speeds implementations of countermeasures ! • Offensive operations detect and identify adversarial tactics for isolation and neutralization Insider Threat:! • Awareness and Training ! • Anomaly-based detection ! • Analysis of Information Technology, Auditing, and Monitoring.! • Foreign Travel, Contact Reporting and Analysis ! • Personnel Security, Evaluation, Analysis, and Reporting! • Security Incident Reporting and Evaluation, Proactive Initiative Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013
  • 9. Please contact me with your questions. ! Brian Keith! Director - Sales & Marketing! SRIG Solutions, LLC! 515.720.2031! info@srig-s.com! www.srigsolutions.com !   
 
 
 Contact Information Proprietary S u r v e i l l a n c e R e c o n n a i s s a n c e I n t e l l i g e n c e G r o u p 2013

×