What happened yesterday is of importance only in context of what will happen tomorrow.
What we routinely monitor. Twitter 24/7 during disorders.
Our researchers and analysts identified an internal jihadi document from al Qaeda of Iraq to their followers. It told of the coming “harvest”. Our people knew that “harvest” has a dual meaning. It also means the harvesting of heads – we were able to provide advance knowledge of a coming offensive.
We operate in a Partnership with our clients using a feedback loop through the Case Officer. Real time alertsRecommendations to reduce vulnerabilityAccess to analystsSpecialized research and analysis Custom security briefings Take quick and effective action by receiving and analyzing timely information
Real time and continual monitoring intelligence analysis and alerts Recommendations to reduce vulnerability Client Access to analysts and databases Special research and analysis Country, region, or your specific topic Threat alerts pertaining to industry, operations, and employees
I have a friend who was doing consulting work for the State Department in Bangladesh. He would get a SitRep report from a service that his company contracted with. Ane he’d say to himself, “That’s not true?!?!?!” That’s why our Ground Truth Network is one of our prime sources of information. A-Z, But in truth, not EVERY country in between. Example – Nigeria and the criminal gangsGlobal threats pertaining to industry operationsTerrorist threat information particularly directed towards the clientTargeting of assets utilized by the client in the various countriesTargeting of personnel during business and personal travelPre-operational indicators such as surveillance, presence of known terrorists in country, etc.
Crisis management team. Standard is 1 hour. Last time, it took 35 minutes.
Fusion Center Briefs Final
The Targeted Actionable Monitoring Center<br />Institute of Terrorism Research and Response<br />Information Collection and Management <br />Homeland Security Presidential Directive<br />Critical Infrastructure Identification, Prioritization, and Protection<br />