Counterterrorism

Counterterrorism 2017-08-30T05:44:44+00:00

We collect and analyze operational data from multiple sources to support counterterrorism, exploitation and intelligence missions.

Our counterterrorism capabilities include:

  • IRREGULAR WARFARE
    • Weapons Technical Intelligence (WTI)
    • Counter IED Forensics
    • Computational Sciences Research and Development
    • Stabilization, Security, Transition, and Reconstruction Operations
  • IDENTITY RESOLUTION
    • Design, Build and Maintain Biometrics Networks
    • Forensics Exploitation
    • Theater Exploitation Database (TED) Administration
    • Document and Media Exploitation (DOMEX)
    • Cellular Exploitation (CELLEX)
    • Exercise Planner
  • INTELLIGENCE
    • Information Sharing
    • Analytical Support
    • IT Infiltration/Technology/System Integrated Architecture
    • Open Source and Social Media Analysis and Exploitation
    • All Source Analysis
    • Counterintelligence (CI)
    • Human Intelligence (HUMINT)
    • Intelligence, Surveillance, and Reconnaissance (ISR) PED
    • (FMV, EO/MS, SAR, GMTI, SIGINT, IMINT, Hyperspectral, DCGS, DGS, BICES)