INTELLIGENCE
NSR's proven Operational Intelligence model is integrated and modular, providing end-to-end services thath enable customers to operate all the layers required for a working Intelligence solution:
-
Recruitment
-
Training
-
Maintenance
-
Support

FORMING AN INTELLIGENCE UNIT
Collect
Collect information on specific targets by predefined rules.
Respond
Respond to triggers, gathering specific information ito bring events to desired resolution.
Gather
Collect all needed information using SIGINT, OSINT and VISINT technologies via on-the-ground teams.
Manage
Continuous intelligence management internally and out of the country




THE DESK
Radiation Control
Measures radioactivity levels and detects gamma and beta particles via Geiger counter.
NSR's proven Operational Intelligence model is integrated and modular, providing end-to-end services thath enable customers to operate all the layers required for a working Intelligence solution:
-
Recruitment
-
Training
-
Maintenance
-
Support

FORMING AN INTELLIGENCE UNIT
Collect
Collect information on specific targets by predefined rules.
Respond
Respond to triggers, gathering specific information ito bring events to desired resolution.
Gather
Collect all needed information using SIGINT, OSINT and VISINT technologies via on-the-ground teams.
Manage
Continuous intelligence management internally and out of the country




THE DESK



Link Analysis
Link Analysis of objects and relationships is implemented to uncover relevant information.
Intelligence Lifecycle
The desk manages the unit's full lifecycle: from analysis, through planning, to processing,
Object Mapping
The desk maps objects of interest and groups them according to relationships
OSINT




Multimedia Support
Profiler
-
Complete profile collector
-
Multiple SM and IM exposure
-
Link analysis
-
Uncover hidden acounts and expose illigeal activities
Control Interface
-
Secure desktop environment
-
Complete anonymization
-
Open for 3rd party apps
-
Secure data transfer
Virtual ID
An investigation tool that generates social network abilities powered by AI and tailored to draw in targets and extract information.
SIGINT



Mobile Tracking
-
Real time & historic analysis
-
View all mobile phone communication in area
-
Find links and connections to black lists numbers
-
Analyze behavior patterns
Strategic System
Mapping
A mapping tool that utilizes web-based and cellular information to identify real-world location of objects of interest and their real-world interactions.
Jam/Intercept
A range of data and communications interception and jamming tools.




CYBER CENTER



Cyber Center
Design and create an operable Cyber Center with full hacking capabilities, including end-to-end HUMINT and technical acquisition & training.
Defensive Cyber Protection:
-
Cyber Espionage
-
Cyber Terrorism
-
Hacking
-
Malware
-
Email Threats
-
Phishing
COVERT SOLUTIONS

Covert Vehicles
• Cameras
• Audio Pickup
• C&C Centers

Covert Sensors
• Cameras
• Audio Pickup
• Motion Sensors
• Thermal Sensors
-
File sharing
-
Social Networks
-
Voice over IP
-
Mobile messaging
-
Locations indoor & outdoor
-
All comm. types decryption
-
Speed of movement detection
-
Links between subscribers
-
Behavior patterns analysis