Counterintelligence (CI)           Human Intelligence (HUMINT)

RISC’s CI/HUMINT professionals have executed tradecraft in the field at tactical and strategic levels, in management positions at combatant command and national levels, in classrooms, and in the national arena of developing doctrines and policies

RISC’s CI/HUMINT professionals have executed tradecraft in the field at tactical and strategic levels, in management positions at combatant command and national levels, in classrooms, and in the national arena of developing doctrines and policies

Open Source Intelligence

RISC utilizes publicly available information to enrich understanding of events, anticipate trends and activities, and provide deeper understanding for decision-makers.

RISC utilizes publicly available information to enrich understanding of events, anticipate trends and activities, and provide deeper understanding for decision-makers.

Insider Threat Programs

RISC develops Insider threat programs within an organization to help manage the risks through specific prevention, detection, and response practices and technologies.

RISC develops Insider threat programs within an organization to help manage the risks through specific prevention, detection, and response practices and technologies.

Counterterrorism (CT)                 

Our intelligence professionals provide counterterrorist, analytic, and watch listing support. They augment missions by providing identities analysis, terrorist identity analysis, quality control, records enhancement, biometrics analysis, and encount…

Our intelligence professionals provide counterterrorist, analytic, and watch listing support. They augment missions by providing identities analysis, terrorist identity analysis, quality control, records enhancement, biometrics analysis, and encounters analysis.

     Signals Intelligence 

RISC Professionals examines foreign communications/activity and relays that information by producing combat, strategic and tactical intelligence reports.

RISC Professionals examines foreign communications/activity and relays that information by producing combat, strategic and tactical intelligence reports.

All Source Analysis                     

Our highly specialized intelligence professionals provide intelligence analysis against a range of national and global threats, and are experts in all-source research, analysis, reporting, processes, and intelligence databases

Our highly specialized intelligence professionals provide intelligence analysis against a range of national and global threats, and are experts in all-source research, analysis, reporting, processes, and intelligence databases

Cyber Threat Analysis               

The process in which the knowledge of internal and external information vulnerabilities pertinent to a particular organization is matched against real-world cyber attacks.

The process in which the knowledge of internal and external information vulnerabilities pertinent to a particular organization is matched against real-world cyber attacks.