THREAT INTELLIGENCE
THREATS ANALYZED
-
Active Shooter/Active Assailants
-
Domestic Terrorism
-
Transnational Terrorism
-
UA/UAS (drone technology)
-
Cyber
-
Weaponized use or Sabotage of Chemical, Biological, Radio-logical, Nuclear (CBRN)
-
Weaponized use of Electromagnetic Pulse (EMP)
-
Threats Against Public Utilities (targeting, sabotage, and disruption of)
-
Organized Crime (local and transnational)
-
Violent and Property Crime
-
Narcotics
-
Civil Disturbance
-
Foreign Nation-State Influence and Aggression
-
Foreign Nation-State Intelligence Entities
-
Supply Chain Disruption
-
Insider Threat
Threats are evolving rapidly as our adversaries tirelessly seek new ways to disrupt and destroy our stability, faith in government, and community. While the rapid evolution of technology comes with many benefits, it has also become tools and targets for those intending to disrupt and destroy. Additionally, adversaries and nefarious actors know our weaknesses better than we do, in many cases. As recent history has taught us, it only takes one event to flip the script. Therefore, analyzing a list of threats is not a stagnant process. It has to constantly evolve, through the latest intelligence, and consider as many scenarios as possible. Our threat intelligence products are exhaustive and come from years of experience creating them for the Department of Defense.
​
We primarily analyze threats from a threat-actor perspective. To know your enemy means to know their capability, intent, and history. We use that to determine the most likely targets. Other threats we analyze are tools for nefarious actors, such as cyber, but they are robust enough to warrant their own analysis, which also includes a likelihood of that vector being used by any adversary.
Cyber and drone technologies are attractive tools for (but not used exclusively by) domestic terrorists, transnational terrorists, activists, foreign nation-states, insiders, criminals and more. When these tools are in adversarial hands, they are considered threats for the purpose of threat intelligence and risk assessments. When not used intentionally to damage or disrupt, they are assessed from an accidental hazard point of view.
​
"Threats Against Public Utilities" is also analyzed uniquely. A public utility is a potential target. However, the targeting, sabotage, and disruption of Public utilities can be carried out by numerous threat-actors, to include those with intentions not aligned with terrorism, activism, or foreign nation-states, for instance. Public utilities are inherently vulnerable to some degree for various reasons and are attractive targets because of the scale of impact imposed on the community and other critical infrastructure sectors if destroyed or disrupted. Public utilities are also vulnerable, to some degree, to numerous hazards as well as accidental kinetic and cyber disruptions.
​​
HAZARDS
Hazards are factored into the entire risk assessment. However, when it comes to hazard analysis, there is usually ample research and analysis available regarding the hazards the area should prepare for. There's no need to recreate these products unless they are deemed inadequate or lacking in specific cases.
