M20 Commercial Services Descriptions
All-Source Intelligence
Counter-Intelligence/Human Intelligence (CI/HUMINT)
M20's all-source intelligence analysis uses the full spectrum of intelligence, from support to general military operations to specialized areas such as information operations (10) and counterterrorism operations. M20's experience ranges from the national-strategic level to the local-tactical level, with extensive experience supporting special operations forces (SOF).
M20 provides experienced personnel to both the collector and analyst aspects of the Cl/HUM INT mission. M20's professionals are experienced in military source operations, targeting, and other specialized Cl/HU MINT areas, such as cover and cover support.
Open-Source Intelligence (OSINT)
Equity Chain Mapping and Research
M20's team of SMEs uses open-source intelligence to complement assessments, providing enhanced situational awareness to decision-makers. M20's publicly available information (PAI) analysts are also highly experienced in conducting social media analysis and exploiting other PAI to provide intelligence products in support of operations. M20 can conduct OSINT as a service from offsite using a managed attribution network for access to data subscriptions/tools to provide data processing services or products that can be moved to a secure enclave.
M20's financial researchers identify and map corporate affiliations and stakeholder relationships to break the opaque complexities of networked ownership and control structures. The equity chain mapping process establishes hierarchies, uncovers concealed connections, identifies potential conflicts of interest, reveals dependencies, and is used to assess the overall stability and integrity of business relationships. The mapping process serves as the foundation for targeted investigations, enabling focus on specific entities and individuals within corporate networks.
Enhanced Due Diligence and Vetting
M20's robust due diligence and vetting tool suite and cadre enable organizations to proactively identify and mitigate risks, safeguard the integrity of business operations, protect sensitive information, and uphold ethical standards in the face of evolving geopolitical challenges and threats. Background checks, vendor and partner screening, regulatory compliance analysis, and reputational risk assessments are core competencies.
Geospatial Intelligence (GEOINT)
M20 can provide experienced imagery analysts for analyzing overhead and aerial imagery. Analyze and exploit imagery of all types to support national and law enforcement security goals, concerns, and strategies.
SIGINT
Dark Web Research & Engagment
M20 analysts extract, analyze, and identify foreign activity and communication resulting from electromagnetic emissions. They relay their findings by producing combat, strategic, and tactical intelligence reports and notifying the appropriate commanders of unusual activity or critical situations so our clients can respond with the necessary speed, force, and precision.
While M20 can provide expert targeting professionals to support kinetic operations, our SM Es pioneered the non-kinetic targeting methodology SOF employs for information operations support to counterterrorism missions and high-value individual targeting. M20's targeting analysts are also experienced in conducting targeting for CI/HUMINT operations.
Training
Dark Web Monitoring/Analysis
M20’s team of intelligence SMEs can bring effective, experience‐based instruction to facilitate the growth of the intelligence force. M20 SMEs were tasked to develop a course on intelligence‐based targeting methodology to train intelligence analysts supporting SOF Information Operations across a broad spectrum of operational focuses. Our SMEs are recognized as the “Go‐To” people for intelligence‐based non‐kinetic targeting and the expert instructors to train the force.
M20 can also provide anti‐rendition and pre‐deployment training. Depending on the mission, M20 can provide training to include but not limited to:
• Pre‐Deployment/Deployment planning (Operational SOPs & OPSEC)
• Situational Awareness
• Surveillance
• Counter Surveillance
• Dynamics of an Attack
• Escape, Evasion, and Survival
• Physical Countermeasures
• Firearms Familiarization and Functionality
• Interviewing and Interrogation
• Crisis Media Training
M20 experienced analysts provide deep web research and analysis to support mission operations. M20 researches the Dark Web without the inherent risk and threat associated with this activity. Dark Web sites that are sourced: Darknet Marketplaces, Open FTP sites, Peer‐To‐Peer networks (I2P), Authenticated Chatrooms, Zero Net, Tor, Data Breaches, Internet Relay Chat (IRC), Underground Forums, and High‐Risk Paste Sites to name a few.