97055589
Oct 1, 2021
Aug 1, 2023
Active Trademark
Business assistance, advisory and consulting services in the field of all source intelligence analysis, full motion video/imagery and geospatial intelligence analysis, counter intelligence analysis, signals intelligence analysis, open source intelligence and publicly available information exploitation; Business consulting services in the field of intelligence and security; Business consulting services in the field of performing multi-discipline intelligence analysis and space operations assessments fusing SIGINT, OSINT, MASINT, HUMINT, and All-Source intelligence for numerous Special Access Programs (SAP); Business consulting services in the field of deriving actionable intelligence for the purposes of advanced targeting operations in support of Special Operations Forces (SOF), helicopter landing zone (HLZ) survey and analysis, and force protection (FP); Business consulting services in the field of planning and executing access control and security escort duties for frequent deployment exercises, conferences, and distinguished visitor engagements; Business consulting, management, and planning services in the field of intelligence and security; Business management consulting and advisory services for the intelligence and security industry; Consultation services in the field of company, business sector and industry data and research; Employment counseling and recruiting; Recruitment and placement of personnel in the field of intelligence, national security, and cybersecurity; Talent recruiting services in the field of intelligence, national security, and cybersecurity
Advertising and BusinessComputer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized network access by users without credentials; Computer security services, namely, restricting unauthorized network access by managing accounts, network storage, local authentication servers, file servers, user privileges, local group policy, local software testing, restoration operations, contingency planning, and local backups for Joint Worldwide Intelligence System (JWICS), SIPRNET, NIPRNET, and other networks within the intelligence work center; Computer security services, namely, restricting unauthorized network access by verifying personnel security clearances for permanent party and visiting personnel through multiple clearance verification systems, including JPAS and Scattered Castles, managing and controlling the permanent party and visitor access badging programs for assigned facilities; Computer security services, namely, restricting unauthorized network access by conducting scheduled and unannounced security checks at access points to ensure all personnel are abiding by policies and procedures for classified equipment, packages, and information entering and exiting secure facilities; Computer security threat analysis for protecting data; Data security consultancy; Internet security consultancy
Computer and ScientificConducting personal security clearance background investigations; Personal security consultation; Physical security consultancy; Providing security surveillance of premises for businesses and governmental agencies; Providing security surveillance of premises for others; Security due diligence services for individuals or businesses traveling or opening an office overseas, in the nature of detailed foreign country briefings, vetting of local personnel, establishing host country government contacts, and providing information on sustainable security measures overseas; Security services, namely, armed escorts and security personnel for governmental agencies; Security threat analysis for protecting personal property; Security threat analysis for protecting personal safety; Security threat analysis for protecting public safety; Verifying and monitoring the credentials of employees and visitors for governmental facilities to ensure public safety
Personal