Info Processing & Exploitation

Info Processing & Exploitation

SRC's experience with information exploitation spans SIGINT, cyber, EW analysis and FMV fusion for customers across the DoD and the intelligence community. Through our work on the NSRP program, we have gained a deep understanding of intelligence requirements, processing and workflow. Our engineers can work in a variety of programming languages, target deployment environments, and security networks to provide high-quality, near real-time software solutions that exploit individual intelligence sources and fuse them with other streams.

  • Cyber Security Risk Assessment
    Originally developed for the intelligence community, our continuous monitoring security awareness solution offers threat characterization, statistical and behavioral analysis, and visualization for cyber, insider threat, social media and fraud detection applications.
  • EW Data Analysis
    Our CREW analysis suite combines important RF information from our CREW Duke system with intelligence documents, airborne track data and ground-based, immersive FMV.
  • Knowledge Association Software Toolkit
    KAST was originally designed to support airborne SIGINT exploitation on RIVET JOINT, but has since been extended to provide reasoning and alerting in cyber, border security, and chemical-biological protection.


Contact Us

For more information about our capabilities with info processing and exploitation, please contact us today.

Share This Page