Threat Intelligence

The Threat Intelligence and Analysis Department (TI&A) includes experienced Reserve and ex-military intelligence personnel, former UK government intelligence professionals and academics giving the department depth and capability. This is further enhanced by native Arabic speakers and support by experienced former EOD personnel.

WCTS offers a wide range of Threat Intelligence products and services to customers ranging from Government, to Non-Governmental Organizations, and to private entities.

Read More

Search & Detection

The program will teach students how to evaluate terrorist threat and to approach the essential component of undertaking search activities in an offensive and a defensive role. Students will undertake a number of search operations from body searches, vehicle, building and route searches through to identifying and understanding equipment used in search operations.

Read More

Open Source Intelligence

The Threat Intelligence and Analysis department analysis’ terrorist related events from around the world through open source media coupled with a social media feed and the assistance of robots. This is then disseminated through a number of reports.

Read More

Threat Assessment

The Threat Intelligence and Analysis Department can be commissioned to conduct Threat Assessments for countries, regions or local areas as per a customer’s direction and needs. These are frequently conducted for commercial companies looking to invest into a region and wishing to protect their staff and assets for the duration of a project.

Read More

Social Media Analysis

The Threat Intelligence and Analysis Department (TI&A) has a team dedicated to social media analysis (who have been active for over 10 years) to monitor sites of interest relating to customer intelligence gaps. Such material is then disseminated through a number of reports and the Portal.

Read More

Technical Exploitation

Even with the best counter-threat training, technology, and equipment, it may not be always possible to prevent attacks and incidents from occurring, but what can be done is this: Ensure proper prevention and preparation measures are in place. In order to achieve this efficiently and effectively, military and law enforcement personnel must first understand how and why the perpetrators were able to breach existing security measures.

Post incident technical exploitation is a vital tool in helping to prevent further attacks, but also in ensuring that those responsible can be identified and brought to justice. An appropriately trained and equipped response to conduct this exploitation is a critical capability. Worldwide Counter Threat Solutions (WCTS) is highly experienced in this area, and will work with your organization to guarantee an appropriately trained counter-threat team with an equipped response strategy. Develop an exploitation capability from the start or to improve an existing one, with a little help from WCTS.

Read More

Biometrics

Evidence left behind after an IED or other explosive incident can provide a wealth of information about the bomb-maker, the explosives, and also the group’s tactics and capabilities. The forensics and biometrics experts at work behind the scenes at Worldwide Counter Threat Solutions (WCTS) can sift through the data and produce actionable intelligence for military and law enforcement agencies.

Using the correct principles and procedures for biometric collection and analysis in accordance with legal requirements is vital if the evidence is to be used to identify, target and ultimately prosecute individuals involved in IED construction and placement. WCTS is equipped with a wealth of knowledge in this area, and can provide advice, guidance, and training across a range of biometrics- and forensics-related counter-threat scenarios.

Read More