Recon Reports

We bring you the insights needed to understand risk and manage security programs, assets, and clients.

About Our Reports

When a deeper dive into a person, entity, or threat group is needed, we have you covered. The reports are produced using our special blend of AI-powered data analytics and highly experienced intel operatives.

If you don’t see a report you need, contact us and we can look at how to fulfill your request.

Threat Vulnerability Assessment (TVA) Standard

A proprietary threat and risk analysis focused on security and threat factors associated with a location or specific place. These reports are useful for planning events, getting baseline risk understanding, advocating for security resources, optimizing security placement, and understanding possible weak points. These can be performed in any location domestically or abroad. These follow a five-factor assessment (Commerce/Investment, Weather/Terrain, Economy/Government, Terrorism, Critical safety/Security information) and are delivered as easy-to-read/brief reports.

Threat Vulnerability Assessment (TVA) Deep Recon

The Deep Recon is a much lengthier report than the TVA scan and covers several security and risk factors in depth. This report offers a complete understanding of all threats and risks in and around the property and can be helpful when negotiating contracts, planning important events, or choosing properties for operations.

Intelligence Summary (INTSUM)

A summary of SIGACTS (significant threat activities/events/indicators) over a given time period for a given geolocation/or threat topic. Usually, INTSUMS covers 30 days and provides a recent review of threat activity. These reports are useful to obtain or provide a useful snapshot of recent risks or threat topics in a given area or place.

Situation Report (SITREP)

A report on a given threat topic, event, or organization that provides an update on an emerging or ongoing threat/risk environment. Multiple SITREPs may be necessary to adequately cover a topic. These reports are useful for specific conferences, protective operations, client updates, critical event updates, and more.

Human Risk Assessment (HRA)

includes detailed investigations into criminal history, financial history, civil records, and more extensive employment and education verification

Human Risk Scans (HRS)

Include national criminal databases, sex offender registries, education and employment verification, and possibly credit checks.

Company Vulnerability Profile

A comprehensive report on an organization’s attack surface across multiple edges and vectors. This results in a report covering prioritized threats and potential weaknesses. Think of this report as a Recon into your organization’s weakest points and areas of concern based on threat, business environment, and organizational analysis.

City/Country Risk Reports

A City/Country Risk Report is a comprehensive document that evaluates the potential risks and challenges associated with operating or traveling in a specific city or country. These reports are used by businesses, government agencies, NGOs, and individuals to make informed decisions about investments, travel, and strategic planning. Violent Extremist or Threat Organization Profile- A Violent Extremist or Threat Organization Profile is a comprehensive document that provides detailed information about an organization that poses a significant threat due to its extremist ideologies and activities. This profile is crucial for intelligence agencies, law enforcement, policymakers, and researchers to understand, monitor, and counteract the activities of such groups

Personal/Entity Vulnerability Profile

A comprehensive report on a Pricipals attack surface across multiple edges and vectors. This results in a report covering social, political, business, and financial actions that could expose the principal to security risks. This includes dark web scans of available private data, a negative sentiment that could lead to security events, and details on assets and exposure. This report allows the Security team to advise principals on known risks as well as recommend actions the principal may take to lower the risk exposure.

Competitive Analysis

A Competitive Analysis is a strategic assessment tool used by businesses to identify and evaluate the strengths, weaknesses, opportunities, and threats posed by current and potential competitors. This analysis helps businesses understand the competitive landscape, recognize market trends, and formulate strategies to gain a competitive edge.

Dark Web Scan

A brief or ongoing open-source scan of dark web activity including the presence of emails, personal info, stolen information, staged attacks, chatter, and multiple other threat topics. These reports are very important for understanding early indicators of threats and possible attacks, from cyber threats to kidnapping or organized crime.

Deep Web Vulnerability

A comprehensive analysis of potential risks and vulnerabilities that exist within the deep web, which encompasses parts of the internet not indexed by standard search engines and includes encrypted networks, forums, and databases. This assessment aims to identify security threats and data breaches that could affect an organization or individual

Contingency/Evasion/Emergency Action Plan (CEEAP) Reports

A comprehensive document designed to prepare organizations, institutions, or individuals for unexpected events, emergencies, and crises. The goal of such a report is to ensure that effective procedures are in place to manage and mitigate risks, protect people and assets, and ensure business continuity.

Transportation/Travel Assessment

A Transportation/Travel Assessment is a comprehensive evaluation of the transportation and travel-related needs, risks, and options for an organization, individual, or project. This assessment aims to ensure safe, efficient, and effective travel while mitigating potential risks and optimizing resources.

Emergency Contact Report

An Emergency Contact Report is a critical document used by organizations, institutions, or individuals to maintain and manage vital contact information that can be quickly accessed in case of an emergency. This report is essential for ensuring that appropriate actions can be taken swiftly to protect and assist individuals during emergencies.

Request more information