Technical Intelligence

Radiance provides intelligence analysis and warfighter support to the DoD and Intelligence Community, specializing in the analysis of threat systems across different domains. Our experts use engineering, technical data analysis, and exploitation to assess the operational capabilities, performance, effectiveness, and vulnerabilities of foreign weapon systems and activities. This helps our customers to make informed decisions that enable effective military operations and protect our troops from harm.

Area of Expertise

Your browser does not support this embedded PDF

Download the PDF

Areas of Expertise

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat.

Select a tab...

EO/IR and Advanced Computing

Radiance specializes in software development, data analysis, cloud infrastructure deployment, and domain expertise, with a particular focus on end-to-end OPIR intelligence production. Our expert researchers are skilled in data exploitation and delivery of results in the most impactful format for stakeholders. Our cutting-edge automated imagery data exploitation solutions can process large amounts of data in minutes, and our advanced machine learning and image processing technology can quickly detect, track, and classify targets of interest. This technology enables analysts to prioritize high-precision activities, while our solutions handle the bulk of data processing, freeing up their time to focus on critical events.

Space Situational Awareness & Radio Frequency Phenomenology

We specialize in the development of advanced tools and algorithms necessary for performing complex MASINT missions and associated technical disciplines. To detect and exploit signature information within MASINT data sources, our team provides deep technical expertise in signal processing, radar and radio-frequency (RF) systems, spectro-radiometry, and insight into target phenomenology and sensor characteristics. We develop software for analyzing EO signatures, techniques for satellite change detection, predictive, and pattern-of-life analysis for RF MASINT, and assess bistatic tools, products, and processes for future improvements.

Physics-Based Modeling and Simulation

Our expertise in creating synthetic data allows us to evaluate new tools, sensors, and algorithms while increasing the understanding of different phenomenologies and processes. We provide simulations for synthetic scene generation, atmospheric modeling, radio frequency analysis, flight reconstruction, sensor evaluation, and laser propagation. We are experts in DIRSIG, COAST, ASSET, MODTRAN, LEEDER, MSIS, IRI, Xpatch, FLO-K, Aurora, SENTRi, and other models.

Analysis

Technical Analysis

We provide advanced GEOINT and supporting analysis to address difficult intelligence questions. Our scientists, engineers, and analysts specialize in non-literal analysis of synthetic aperture radar (SAR) image data; non-literal analysis of multispectral, hyperspectral, and thermal image data; and non-Earth imaging (NEI). Our team also supports GEOINT analysis through application of data science, support to SOM, and creation of infographics.

Literal Analysis

We provide literal GEOINT analysis support by conducting Object Based Production to create structured observations for use in deriving Activity Based Intelligence. Our analysts focus on two key areas: Forces Characterization and Systems Characterization. Forces Characterization analysts leverage the latest GEOINT and Multi-INT technologies to distinguish adversaries' patterns of life (PoL), while Systems characterization analysts use image data exploitation to support assessments of adversaries' Command, Control, Communications, Computers, Intelligence (C4I), Integrated Air Defense Systems (IADS), and space launch capabilities.

Emerging Analysis

Our Emerging Analysis expertise includes assessing and analyzing adversaries' Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) capabilities, performance, and vulnerabilities. Additionally, we are at the forefront of developing deep-learning neural network target detection capabilities for Synthetic Aperture Radar (SAR) imagery, enabling our customers to stay ahead of emerging threats.

Digital Network Exploitation Analysis

We provide deep characterization and mapping of targeted networks and subsystems to support detailed intelligence analysis and mission operations. Our team leverages multiple intelligence sources to create detailed characterization and threat assessments of targeted C4ISR systems that drive deeper intelligence gathering and exploitation efforts.

PIR Data

PIR Data Analysis

Radiance offers a suite of capabilities focused on supporting Persistent Infrared (PIR) Intelligence data analysis and reporting. Our team provides detailed Technical Intelligence (TI) analysis on PIR data and specializes in Slowmover, Fastmover and Track targets worldwide.

PIR Data Extraction

Additionally, we perform PIR Data Extraction Support, manually reviewing and suppressing data using algorithms to help differentiate the background from the target and allow future teams to exploit.

PIR Intelligence Reporting Support

Our PIR Intelligence Reporting Support completes long-term, Fastmover, and Slowmover second and third phase intelligence reporting on worldwide events, including long-term trending products and reports on PIR track data.

Foreign Materiel Exploitation

HW/SW Reverse Engineering

Our experts specialize in the reverse engineering of foreign weapon systems, including both hardware and software analysis and characterization. We analyze embedded technologies with these foreign assets, including field programmable gate arrays (FPGA), digital signal processors (DSP), control circuits, memory and storage devices, and exploitation of domestic and foreign operating systems.

Exploitation Tools Development

We develop and enhance the tools, techniques, and processes to improve the exploitation and characterization of targeted assets. Our team utilizes the latest technology to develop Ghidra scripts and tools that reformat binary capture files and data collected using oscilloscopes and logic analyzers. We also perform more complex software tool development efforts such as exploit demonstrations and Ghidra processor modules, which include sustainment of the tools.

Digital Forensics

Our team applies technical acumen to extract and capture data from hard disks, non-volatile memory, and other data storage locations to support deeper exploitation and analysis. These techniques maintain the integrity of the captured data and store the data in standard formats.

Hardware in the Loop (HIL) Solutions

Our team develops virtualized and rehosted exploited technologies to provide capabilities to test against blue weapon systems and support deeper technical intelligence analysis. We provide fully functional foreign weapon systems as surrogates to be used in test ranges, modeling and simulation campaigns, and program offices to support testing and analysis of US weapon systems vulnerabilities to the exploited technology.

EW & Cyber Effects Development

We develop mission-level electronic warfare (EW) and Cyber Effects from intelligence threat assessments of targeted adversarial systems. Our team provides weapon program offices with the capabilities to conduct full weapon system testing and vulnerability assessments against exploited EW and Cyber systems to support mission planning and weapon system development.

Any Questions?

To get in touch with our team, please visit the contact page below.

Contact Us