Intelligence

JSSA Incorporated, (JSSA) is a leading provider of intelligence analysis services to our federal customers. JSSA has the expertise and experience to deliver timely, accurate, and actionable intelligence products that support decision making and risk management responsibilities. Our analysts have access to a wide range of intelligence sources and collection disciplines, as well as advanced tools and databases to conduct comprehensive research and analysis. We have the skills and capabilities to communicate effectively with various audiences, from senior leadership to all levels of employees in partner agencies.

JSSA also conducts inquiries into counterintelligence and/or suspected insider threat activities and can support agencies' insider threat missions by identifying, deterring, and disrupting threats to our nation’s assets. We use various methods and sources to detect, analyze, and mitigate potential insider threats, including open-source research, dark web monitoring, data mining, and case support.

Threat Intelligence / Open-Source Capabilities

Working with JSSA offers our customers several significant benefits, such as a proven track record of delivering high-quality intelligence products that meet or exceed client expectations and requirements. JSSA has past and ongoing successful engagements with DHS, DoD, DOJ, FBI, NSA, and other agencies. Our team of highly qualified and experienced intelligence analysts with diverse backgrounds and skill sets have a flexible and adaptable approach to meet the changing needs and demands of the intelligence environment. Our company culture includes a strong commitment to customer satisfaction and continuous improvement.

  • Threat Intelligence Analysts Capabilities:
    • • All-Source intelligence analysis
    • • Expertise in analysis driven products utilizing Intelligence Community (IC) directives.
    • • Experience in crafting timely written and oral assessments utilizing various intelligence sources or collection disciplines.
    • • Intelligence briefings capabilities for leadership at all levels
    • • Threat assessments (Special Events, Personal, Travel, Executive Protection)
    • • Intelligence Bulletins, Notes, and White Papers covering a range of national defense issues.
    • • Advanced fusion analysis of classified and unclassified databases
    • • Experience using IC tools and databases.
    • • Develop partner relationships and facilitate information sharing with contacts in the intelligence and law enforcement community.
  • Open-Source Team (OST) Capabilities:
    • • Weekly threat roll-ups/sentiment analysis for selected protectees
    • • Individual open-source vulnerability reports with mitigations
    • • Ad Hoc requests for information (locate individuals/analyze internet presence)
    • • Situational awareness research
    • • Incident response
    • • Travel awareness assessments
    • • Collaboration with partner agencies

Insider Threat Capabilities

JSSA also conducts inquiries into counterintelligence and/or suspected insider threat activities and can support agencies' insider threat missions by identifying, deterring, and disrupting threats to our nation’s assets. We use various methods and sources to detect, analyze, and mitigate potential insider threats, including open-source research, dark web monitoring, data mining, and case support.

  • Insider Threat Analysts Capabilities:
    • • Develop and deliver professional-level reports, memorandums, and/or recommendations that support inquiries and investigations.
    • • Provide analytic case support to investigations, administrative or security inquiries, or other adjudicative assessments, OIG misconduct issues, DoD investigations and external agencies.
    • • Prepare and present analysis, in the form of briefings and/or reports, to leadership.
    • • Create Tactics, Techniques, and Procedures (TTPs) for identifying insider threats and brief team members on emerging threats.
    • • Conduct inquiries, fact finding, and data analysis within various intelligence and other data bases that may contain information relevant to the identification of potential threats.
    • • Identify, gather and integrate data on potential insider threat incidents from various sources.
  • Open-Source Capabilities:
    • • Proactively identify indicators of insider threats within the dark web and open sources - i.e., “What does the internet know about your agency?”
    • • Respond to customers' requests for information related to insider threat investigations, including research regarding persons, places, or other entities.
    • • Produce timely, logical, and detailed reports in support of the insider threat program.
    • • Develop and disseminate TTPs to proactively mitigate insider threats, e.g., social media awareness, internet safety, etc.