Back to the top

Security

What's Different?

Vulnerability/Threat Assessment
Where are we vulnerable, what are the threats?

Risk Assessment
What is the total risk at any location

Geopolitical Context
What is the undercurrent at this location?

Public Reporting Verification
Can I see it with my own eyes?

Vulnerability/Threat Assessment

Where is the vulnerability? What are the threats?

Focus on specific venues/locations, calling out existing vulnerabilities
Report Details
 AnalysisProvide overview of not only vulnerabilities to a facility but also support infrastructure in surrounding area
Key Object identification – Structures, roads, moveable and fixed assets, physical and manmade related to vulnerability/threat
Vulnerabilities will be assessed based on specified requirements – man-made vulnerabilities. Weak points in and around facilities (ex, perimeter fencing, barriers and interface).
Input typesSatellite imagery, open-source intelligence, field observation, road network, national mapping agencies, secondary research, customer supplied
Discovery ReportImage overview with existing vulnerabilities identified, max 2kmx2km
Identification of Key Object relevant toward project completion/goals
Infrastructure – Roads, Transportation, Water, Power
Area: up to 5 square kilometers
Analysis ReportSurrounding area support (transportation hubs, hospitals, police/fire locations), max 5kmx5km.
Identification of Key Objects related to vulnerability and threats
Key Site Observations leveraging additional Open Source content
Area: up to 10 square kilometers

Risk Assessment

What is the total risk at any location?

Focus on specific venues/locations, calling out potential vulnerabilities
Report Details
 AnalysisProvide overview of overall Risk – the product of vulnerabilities and Threats for a specific location
Key Object identification
Structures, roads, moveable and fixed assets, physical and manmade related to Risk
Vulnerabilities will be assessed based on specified requirements – risks of natural and or man-made nature will be addressed. Potential for the impacts of future, attacks, bombings, political unrest, flooding, fires earthquakes or other naturally occurring events is identified.
Input typesSatellite imagery, open-source intelligence, field observation, road network, national mapping agencies, secondary research, customer supplied
Discovery ReportImage overview with potential risks identified.
Identification of Key Object relevant to over all risk:
Infrastructure – Roads, Transportation, Water, Power
Area: up to 5 square kilometers
Analysis ReportSurrounding area support (transportation hubs, hospitals, police/fire locations), max 5kmx5km.
Identification of Key Objects related to site Risk
Key Site Observations leveraging additional Open Source content
Area: up to 10 square kilometers

Geopolitical Context

What is the undercurrent in this area?

Trend/Sentiment in a location
Report Details
 AnalysisAccounting for regional political influences, a view of the political trends in the local populations
Key Object Identification – Structures, roads, moveable and fixed assets, physical and manmade related to Risk
Geo-political issues, variables and trigger points related to seen or identifiable objects will be assessed on specific requirements – demonstrations, marches, protests, gatherings, military activity based on geo-political events will be identified as well as damage resulting from said activities. Police, military outposts/facilities, political offices/gathering area’s, vehicles, equipment, tents, groups of people will be identified.
Input typesSatellite imagery, open-source intelligence, field observation, road network, national mapping agencies, secondary research, customer supplied
Discovery ReportImmediate changes underway called out
Identification of Key Object relevant toward project completion/goals
Infrastructure – Roads, Transportation, Water, Power
Area: up to 5 square kilometers
Analysis ReportHistorical context provided.
Identification of Key Object and Key Changes
Key Site Observations leveraging additional Open Source content
Area: up to 10 square kilometers

Public Reporting Verification

Can I see it with my own eyes?

Checking the “obvious” vs the “reported”
Report Details
 AnalysisAccounting for local reports of information, provide an overview that not only provides a geospatial context for such reporting, but also then maps reports to observed changes on the ground
Area or facilities will be evaluated on publicly reported security events for visual conformation – Any security related, demonstrations, marches, protests, gatherings, military activity as well as damage resulting from said activities will be evaluated. Police, military outposts/facilities, political offices/gathering area’s, vehicles, equipment, tents, groups of people will be identified. Any damage or changes related to natural disasters will be assessed.
Input typesSatellite imagery, open-source intelligence, field observation, road network, national mapping agencies, secondary research, customer supplied
Discovery ReportComparison of “reported” changes to visible changes
Identification of Key Object relevant toward comparison
Infrastructure – Roads, Transportation, Water, Power
Area: up to 5 square kilometers
Analysis ReportComparison of “reported” changes to visible changes
Identification of Key Object and Key Changes made toward project completion/goals
Key Site Observations leveraging additional Open Source content
Quantification and estimation of project readiness
Area: up to 10 square kilometers

© 2019 AllSource Analysis | Site by DogCat Marketing