M. SEDANO REYNOLDS, CISSP
(verification #*****)
Bridgeport, WV 26330
******@**.*********@****.***********@*****.***
Active US Top Secret/SCI Clearance
SUMMARY:
24 years General IT
21 yrs Intelligence Analyst/OPS Specialist
12 years Cyber-Network Security Engineering
9 years Cyber-Security Architecture
8 years Information Assurance & Forensics
7 yrs Technical Project Management
6 yrs of Certification & Accreditation (DITSCAP/DIACAP/NIACAP)
QUALIFICATIONS:
Familiarity with a wide variety of security frameworks, including:
DITSCAP, DIACAP, NIACAP, NIST SP 800, ISO17799
IAM Level III Certified (CISSP)
SME with governmental security requirements, including:
FISMA, DCID 6/3, DCID 6/9 and FBI CJIS CAPP
Experience developing and supporting IA documentation, including:
SSAs, SSPs, STIGs, RTMs, and other C&A/POA&M
PROFESSIONAL EXPERIENCE:
Leonie Industries Private ContractAug 2010-Present
Global Multi-Disciplined Intelligence /All Source Intelligence-Operations Integrator
Analyst: Participated in production, indications and warning, collection management,
targeting, imagery, network analysis, counterintelligence, counter-terrorism, information
operations, foreign disclosure, international engagements and threat analysis. Initiated
and conducted deep dive research efforts; planned, coordinated and synthesized research to
produce all source intelligence products/responses. Served in collateral duties included:
Operations Subject Matter Expert as Primary advisor to the deployed Brigade Commander and
staff on all activities with regards to planning, and synchronization of effort of JIEDDO
and JIEDDO COIC support to deployed combat elements. Direct link between JIEDDO COIC and
deployed combat units on all current and future initiatives. Ensured all requests for
support for JIEDDO COIC products are fully coordinated with other JIEDDO COIC deployed
assets and the JIEDDO COIC. Ensured combat assets are kept abreast of all current and
emerging JIEDDO COIC processes, methodologies, and Tactics, Techniques & Procedures (TTP)
for attacking threat networks that utilize IEDs/IRAMS. Provided advice to Combatant
Commanders and their staff on how to best integrate JIEDDO COIC capabilities into their
ongoing operations and analytical efforts in support of actionable intelligence against
hostile forces.
System One Mar 2010-Aug 2010
Cyber Security Intelligence SME - Major Nuclear Power Plant HQ - Major Nuclear Power HQ
Firm, Cranberry Twp, Pa 2010
Cyber Security SME- Leadership responsibilities include providing overall direction,
design, implementation and management of the global information technology cyber security
implementation relevant to business requirements, DOE, NRC, FERC, NERC critical
information protection regulations, internal and external cyber security threats. Thorough
familiarity with Smart Grid technologies as well as providing subject matter expertise on
SCADA(Supervisory Control and Data Acquisition).
Strategic role requiring critical cyber asset identification, troubleshooting, tools
evaluation, intrusion prevention and cyber security training implementation for the AP1000
Project organization.
Primary Responsibilities
Assess technical information security posture, analyze and recommend changes to mission
critical networks, cluster servers and workstation environments
Design security-based solutions to address cyber security vulnerabilities
Implement approved changes that address the security posture
Manage security risks within acceptable limits while in compliance with established
regulatory requirements.
Secondary Responsibilities
Assist Electronic Systems Integration Group regarding cyber security issues. Including
evaluating application and network designs, acquisition of new hardware, software and
services while providing a security prospective and guidance as a service for major
critical infrastructures identified by US Department of Homeland Security.
Additionally, supported baseline assessment of computer networks, industrial control
systems and digital devices to NERC and NRC standards, to include; modification
documentation reviews, drawing reviews, and plant system walk downs.
Provide technical and subject matter expertise in cyber security, malicious software,
viruses and other forms of cyber attack and cyber vulnerability.
Support the identification of cyber threats and vulnerabilities, and participate in the
development of mitigation and protection strategies to minimize impact and risk from
radiation sabotage.
Trace SystemsDec 2009-Mar 2010All Source Cyber-Intel Analyst - Prepped for Afghan deployment under Trace Systems Inc.
Contract suspended. Worked on DOD NIPRnet, SIPRnet, and JWICS networks. Honed skills
utilizing Information Assurance (IA) monitoring tools (e.g., WhatsUp Gold, Sniffer,
Ethereal, Dameware, SolarWinds, Protector Series, ObjectFinder, etc.) Uncanny ability to
establish rapport and interact effectively with customers, supervisors, and/or functional
peer groups to meet objectives productively in a team environment. Gained proficiency in
the field of vulnerability assessments, scanning and penetration testing. Strong working
experience in automated VA, scanning, and penetration tools such as, but not limited to:
Nmap, Nessus, Qualys, AppDetective, Webinspect, AppScan, Nikto, nCircle, BackTrack, Social
Engineering Toolkit, Burp, Metasploit Framework, Core Impact Pro, Wireshark, Retina.
Mentored junior colleagues on FISMA/Clinger Cohen Act compliance requirements.
DHS
Federal Bureau of Investigation, DOJAug 2009-Dec 2009Information Systems Security Officer/Task Order LeaderIntegrated Automated Fingerprint Identification System
Clarksburg, WV
Provided subject matter expertise in the secure design of enterprise network solutions
and services including DMZ, firewall technology, encryption methodologies, secure
networking, intrusion detection, virtual private networking, routing and switching,
enterprise identity and access management solutions (to include federated identity),
enterprise e-mail gateway implementations, Domain Naming Services (to include secure DNS),
wide and local area networks, enterprise logging and auditing, Web & FTP proxy, SOA and
storage solutions. As Project Management lead for the FBI task order, perform project
planning, strategy services and execution, budget, scheduling and monthly status reports
for multiple ISSO roles. Daily interaction with ISSM and ISSR for POA&M oversight using
NIST C&A processes. FBI CJIS CAPP Cyber-Security SME experience.
Jorge Scientific Corp.
Department of DefenseDec 2008 - Aug 2009Information Assurance Officer/Information Systems Security Officer
Responsibilities include development, writing and maintaining formal Information Systems
Security Program. This includes all applicable security documentation in addition to
system security plans (SSPs), System Security Authorization Agreements (SSAAs), network
and system diagrams, Security Requirement Traceability Matrices (SRTMs), and other
applicable Information System (IS) documentation. Most recently assigned to Task Force
ODIN/Constant Hawk/C-IED
Review of System Security Packages and Accreditation Status
Review and approve or deny the entry / exit of AIS equipment
Also responsible for the certification and accreditation (CA) of medium to highly complex
systems. This role also manages a portfolio of systems both CONUS and OCONUS. Leadership
initiatives include working with system program managers, systems administrators, and
information systems security representatives to facilitate the production of CA packages
in a cooperative manner. These packages will consist of systems certification and
accreditation packages that are expiring, being recapitalized and new systems being
deployed pursuant to DIACAP/FISMA requirements.
Recalled to Active Duty Military Mar 2008 - Dec 2008All Source Intelligence Analyst
Plan, organize, manage, and perform intelligence operations and technical information
assurance functions for 106th Rescue Wing, Air National Guard Unit daily operations,
training and readiness missions.
Additionally, provide knowledge transfer of the operational procedures of the USAF Air
and Space Operations Center (AOC) Intelligence, Surveillance, and Reconnaissance (ISR)
Division.
Prepared detailed training requirements of the ISR duty positions in Analysis-Correlation-
and-Fusion, ISR-Operations-Processing-Exploitation-Dissemination; and Targeting functions
at the operational level of war within an AOC
Working knowledge of Distributed Common Ground Station (DCGS) operations.
Altria Group/Electronic Data ServiceDec 2003 - Mar 2008Senior Security Compliance Architect
Provided effective Information Security, Cyber-defense and Enterprise Risk Reduction
Programs for all of Altria family of companies across multiple data centers and geographic
regions. Supported: Phillip Morris USA, Phillip Morris International & Kraft Global
Provided consistent interpretation of Enterprise Information Security Policy, Standards
and Governance.
Promoted security awareness and understanding of Information Security Compliance &
Privacy to all levels of the business (executive management, directors technical, support
staff, consultants and vendors, etc.)
Managed Information Security Risks through coordinating internal Security Risk
Assessments and the creation of the Corporate Information Security risk acceptance
process.
Ensured appropriate Information Assurance Compliance requirements are addressed in all
application development initiatives.
Semper Fi Global Comm., Inc., Silicon Valley, CA & NYC Jun 2001 - Dec 2003Information Security Architect
Spearheaded and conducted confidential forensic analysis of more than 300 seized computer
systems for organizations in military, law enforcement, healthcare, retail & financial
industry.
Implemented disaster recovery planning, pen-testing, auditing, risk analysis, business
resumption planning, contingency planning, as well as contract and vendor negotiations of
third party security firms.
Provided technical application security lead for engineering and business units in
development of wired and wireless (802.11x) solutions in line with enterprise business
enabling goals. Silicon Valley & NYC.
Designed Windows XP enterprise hands-on cyber-security architecture, concepts, and
infrastructure for managed desktop support to enhance client's security posture. Silicon
Valley, Ca.
Technical Advisory Board member, Alliance America, Inc. (Homeland Security Initiative)
Developed host based defense methodologies while conducting research and analysis for
next generation web based attacks against critical infrastructures.
Performed IS audits for a myriad of large Fortune companies in accordance with COBIT
standards.
Established Security compliance analysis, audit and remediation for Fortune 11 firms
towards achievement of industry recognized enterprise-wide security certification from
TruSecure ICSA labs.
Merrill Lynch & Co., New York, NY Mar 1999 - Jun 2001Senior Enterprise Network Security Project Manager, Information Security & Privacy Group
Project lead of Merrill Lynch Corporate and Institutional Client Group's enterprise
network security team.
Gathered business requirements from international and domestic business groups
Oversaw new client requests, maintained firewall rule base design and architecture for
all business units within ML's Corporate and Institutional Client Group
Investigated and identified security issues, mitigate potential risks and implement
controls in accordance with corporate security policy, standards and governance.
Evaluated and selected enterprise tools for implementation of electronic evidence
gathering at targeted infrastructures.
Prepared detailed specifications for encryption technology, digital signing, PKI, VPN,
IPSec, SSL, and Kerberos technology and Limited Sign-On approaches.
Senior E-commerce Service Delivery Manager, Merrill Lynch Direct Market Group
Planned and executed E-commerce business unit expansion proposal and initiative for
presentation to CFO and executive management of the firm. This process involved
participation in vendor selection process for Gig-E connectivity; Selection of onsite
technical candidates for project lead, engineering and administration;
Reviewed architectural designs with Cisco technical engineers; Designed strategies for
connectivity while mitigating security risks of the firm's portal and; wrote technical
requirements and specs for co-location of web hosting environment.
Lead teams of highly skilled technical engineers to deploy the network infrastructure at
the Merrill Lynch London location.
Resolved infrastructure and networking security issues; Performed architecture,
design/application reviews; Conducted intrusion tests, fail-over/high availability tests;
Produced technical/process recommendations; Analyzed industry available tools with respect
to multiple business client requirements; and participated in change management and design
review boards.
Semper Fi Global Comm. Inc., New York, NY Dec 1997 - Mar 1999Chief Technology Officer (Outsourced Consultant
)
Security Intelligence services consulting for Fortune 100 including
Dept. of Defense;
Department of Justice, Morgan Stanley, Dean Witter & Co., Merrill Lynch & Co, Johnson &
Johnson, SOCGEN (French Bank), Columbia Artists Management, CompUSA, AT&T Solutions.
Responsibilities included leadership advisement for more than 650 LAN/WAN engineers,
vendors, programmers and IT trainers, with additional oversight for the daily and
continued operations of multiple clients' global networking environment, WAN
infrastructure (Servers, hubs, switches, cabling, connectivity hardware), desktop
PCs/peripherals.
Recalled to Active Military Duty
U.S. Justice Department, El Centro, CA & Puerto Rico Apr 1996 - Dec 1997Sr. Intelligence Analyst/Sr. Project Leader
Responsibilities Included:
Project Lead for upgrade of systems hardware and intelligence software providing IT
vendor management leadership for integration and implementation of various dissimilar US
Gov't networks, proprietary applications and hardware; Network; Migration included Novell
3.x to Windows NT 4.0; Provided leadership training and field support of multiple projects
on; Remote communications and Internet open source enterprise solutions utilizing MS
Project; Provided timely automated intelligence reports through the use of multi-platform
Internet open sources. Utilized DITSCAP Standards for Systems Integration.
Lead Tiger Team member for Joint Task Forces Counter-Drug initiatives.
Member of U. S. Narcotics and International Drug Interdiction effort code-named Valley
Project in the U. S. Southwest Border. Supported more than 25,000 nodes. Combined $140
million dollar budget. Provided executive summaries & briefs for high-level prosecution.
Semper Fi Global Comm., Inc., East Meadow, NY May 1986 - Apr 1996Systems Administrator & Network Security Consultant
Consulting contracts for Fortune 100 including Dept of Defense; Department of Justice,
Morgan Stanley, Dean Witter & Co., Merrill Lynch, Johnson & Johnson, SOCGEN (French Bank),
Columbia Artists Management, CompUSA, AT&T Solutions.
Responsibilities Included:
Defining client security policies.
Creating strategic and tactical security implementation plan & manage its execution
Evaluated & introduced security products and tools for client consumption
Conducted systems audits for new and current devices
Updated security policies, standards, governance & procedures.
United States Marine Corps1975 - 1998
Gunnery Sergeant of Marines
United States Marine Corps Active Reserves1986 - 1998
Active Duty Service
1975-1986
Progressively rose to the ranks from Private to Gunnery Sergeant of U.S. Marines.
Global peace-keeping assignments include Asia-Pacific, Middle East, Europe, South and
Central Americas; duties include small unit combat infantry leader, photojournalist,
counter-intelligence and intelligence specialist/analyst.
Trained in counter-terrorism and advanced counter-intelligence/counter-insurgency
operations.
Advanced special operations, low intensity conflict, asymmetric warfare, nuclear,
biological and chemical warfare.
Assigned to lead a myriad of international joint task forces including counter-drug
missions with the US Justice Dept. under the auspices of DoD and the White House Drug
Control initiatives.
EDUCATION
Fairfax University, Distance Learning Degree Expected December 2012
MBA Program, Global Technology Management
S.U.N.Y, Empire State College, Saratoga Springs, NY 1988
Bachelor of Science, Interdisciplinary Studies & Communications
REFERENCES
Available upon requestand mutual interest
Miscellaneous tools/topologies/technologies:
ABC Terrorism Prediction Model
CASIAT (Computer Assisted Security Investigative Analysis Tool)
CIPA (Counter Insurgency Pattern Assessment)
Data Detective
DataMiner 3D
Data mining suite
DataMite
DataScope
Data Serfer
DataSurferPlus
Data Surveyor
LAW (Link Analysis Workbench)
Intelligent Miner for Text
NORA (Non-Obvious Relationship Analysis)
SpyGLASA2IPB
ABA
ABC Terrorism Prediction Model
ABIS (Automated Biometric Identification System)
AC2
ACCO (Army Central Control Office) counter-intelligence investigations database
ACOA
ACTOR (Analyzing Complex Threats for Operations and Readiness)
Adversary
AeroText
AFIS (Automated Fingerprint Identification Systems)
AIES (Automated Information Extraction System)
AIM
AIR (Arabic Information Retrieval):
Aira Data Mining Tool
AIPSA (Automated Intel Processing for Situational Awareness)
aiSee
AKA
ALADDIN (Automated Link Analysis for Data Mining of Distributed Information)
ALE (Aires Life Extension)
Alembic
ALICE d'ISoft
Alien Migration db
Alterian NucleusAME (analyst modeling environment)
Analyst Notebook/Analyst Notebook Link Chart Reader
Analyst Workbench
Anchory
AnswerTree
Answerer
AOCG (automated org-chart generation)
APOLLO
Aquarius
ARENA
ARM
ART (Author-Recipient-Topic)
ASAS (All Source Analysis System)/ASAS-L with MAST
ASID (Automated Systems Integration Management Intelligence Database)
ASIM (Automated Security Incident Measurement)
Association
AT Sigma Data Chopper
ATHENA
ATIX (Anti-Terrorism Information Exchange/Automated Trusted Information Exchange):
AUDITT
AutoMap
Autonomy
Automatic Identification System
Automated Warning Prototype
Auto-X tools
AutoTrackXP (ATXP)
AXIS (Analysis and eXploration of Information Sources)
AVS/Express Visualization Edition
Basketball
BioWar
Blackknight
Blue Data Miner
BNN (Broadcast News Navigator)
Breve
Broadbase EPM (Enter Perf Mgmt)
Brocade
BUILDINGCODE
BusinessMiner
C2PC
CADRE (Continuous Analysis and Discovery from Relational Evidence)
CamStudio
Camps
Capri
Carillon
CART
CASIAT (Computer Assisted Security Investigative Analysis Tool)
Categorizer/Tree Studio
CATEIS (Counterintelligence Automated Tactical Exploitation & Information Software)
CCDB (Consolidated Counterdrug Data Base)
CCIP (Counterterrorism Collaboration Interoperability Project)
CCM
Centrifuge
CETA
Chassis
CHATS (CI/HUMINT Automation Tool Set)
Checkpoint
CHIMS (CI/HUMINT Information Management System)
CHINET (Chinese Name Extraction and Translation)
CIA TD/TDX
CiceroLite:
CIDAR (Critical Infrastructure Detection, Analysis and Reporting)
CIM (Critical Intent Model)
CIM/SEAS Nested Argumentation
CIPA (Counter Insurgency Pattern Assessment)
CIRC
CIS (Case Information System)
CITF (Criminal Investigative Task Force) Web-enabled Database
CJMTK
Clear Case
Clear Quest
ClearForest
ClearResearch
Clementine
CMS (Case Management System)
Cobra Focus
CODIS (Combined DNA Index System)
CoGen
COGNET
Cognos (COTS Tool for Report Generation)
Coliseum
Conceptual Model of Counter-Terrorism Operations
Constant Web
Construct
Content Analyst
Context
Convera
Cornerstone
Coverterm
CPOF
CPXP
CrimeLink
CrissCross
CrossGraphs
CTAC (Counter-Terrorism Analysis Capability)
CTDB (Combating Terrorism Database)
CT-AVRS/CT-AVARS (Combined Theater - Analyst Vetted Relational System/Combined Theater
Analyst-Vetted, Relational, Structured Database)
Cubist
Cultweave/Cultweave II
CyberLINXX
CyberTrans
CYC
Darwin
Data Clarity
Data Detective
Data Logic/RDS
DataMiner 3D
Data mining suite
DataMite
DataScope
Data Serfer
DataSurferPlus
Data Surveyor
DB2
dbProbe
DCIIS
DECIDE
DecisionWORKS
DeltaMiner
Diamond
DIAZ
DIMS (Detainee Information Management System)
DNA (Dynamic Network Analysis)
Dollar-Dinar db DOORS
Dream Media
DTES
DyNet
Eagle Eye
EARS
EASYBORDER
EICK
EKM
Elite Network Modeling
Emergejust (EJ)
Enterprise Miner
ENVIE (Extensible News Video Exploitation for Intelligence Analysis)
Envision
EP
FaceIt
FactBrowser
Fair Isaac
Fascia
FAST DIAMOND US
FAST ISSM
FAST toolbox for OOTW
FastTalk
Fastus/TextPro
FatCat
FeedDemon
Festival
FINTEL
FOMA
FORECITE Monitor
Foreign terrorism communication profile database
Foundationstone
Fraud Investigator
Freedom
Fulcrum Knowledge Server
GATE (General Architecture for Text Engineering)
GBAE (Glass Box Analytical Environment)
GCS
GDA
GDM-FC
Geo-Browser
Genysis
GeoTagger
GIDI
GIP (Generic Intelligence Processor)
Glide
Graphlet
GRAPHVIZ/graphvis
Grindstone
Groove Workspace:
Groundbreaker
Group Discovery Algorithm
Guardian
Harvester
HD Map
HIDTA DIG (High Intensity Drug Trafficking Areas Digital Information Gateway)
Highpoint
HIS (HUMINT Imagery Server)
Homebase/Homebase II
HMSng (HUMINT Management System next generation)
HPS (HUMINT Processing System)
Hydrant
i2 Visual Notebook:
IAA (Intelligence Analyst Associate)
IAFIS (Integrated Automated Fingerprint Identification System)
iBase
IBM Intelligence Miner for Data
IBM MT:
IC ROSE
IdentiFinder
IDP (Intelligence discovery portal)
IDW (Investigative Data Warehouse)
IE CounterDrug
IES (IIR Evaluation System)
IFS (Intelligence Fusion System)
ILS
iMapData
IMPACT (Intelligent Mining Platform for the Analysis of Counter Terrorism)
InCLUEsion
Indri
InFact
InfoMASQ
Informix Red Brick Formation
InfoWorkspace
InfoXtract
INQUEST
IN-SPIRE
Insta-Know
Intelligent Miner for Text
Intelligenxia
InterSCOPE 3-D Geospatial Visualization
INTREPID (Intelligence and Terrorist Photograph Identification Database)
IR Discover
ISM (InfoSphere Management System)
ITN (Identification Tasking and Network)
IWS
Jabber
Jaguar
JDS
JMIE
Juggernaut
JWARN (Joint Warning System)
KATE-DataMining
KDD Explorer/SRA KDD Explorer
Keycard
KeyPlayer
KnowledgeSEEKER
KnowledgeSTUDIO
LADS (Linkage Analysis Database System)
LAS
LAW (Link Analysis Workbench)
LDS (Lotus Discovery Server)
LEADMiner (NIPS)
LEMUR
LexiQuest Mine
LingPipe
LingSoft
LinkView
LSI (Latent Semantic Indexer)
Mage
Mailorder
Mainway
Malolo
Malta
MAPLE
MARS
MatView
MAUI NITE
MayaVis
Media Manager
METIS
METS (Metadata Extraction and Tagging Service)
MindManager
MINDS (Multilingual Interactive Document Summarization)
MINER
Minerva
MineSet
MiTAP (MITRE Text and Audio Processing)
MODEL 1
Modus Operandi Database
Mohomine
MPES
Name Variant
NameStats
NDA (name data archive)
NDCore
NDEx (National Data Exchange)
NDPIX (National Drug Pointer Index)
NER (named entity extraction)
Nested Vision 3D
NetDraw
Netica
NetMap Analytics
NetMiner
NetOwl/Net Owl
NETVIZ
NexMiner
NLP++
Nooscape
NORMALLAW
NORA (Non-Obvious Relationship Analysis)
NorthernLight
NRM (NSA Reference Model)
Nuggets
Oasis
ObjectFX
OCULIS
OMNIDEX
OnTap
OnTopic
Open Visualization Data Explorer
Optionspace Visualization
ORA
Orion
ORIONMagic
OSALAT (Open Source Automated Link Analysis Tool)
Outline/Magic
Overwatch
PAC (Portal Automated Collection)
Pajek
Paladin
Pantheon
PASSGEAR
PathFinder
PEAC-WMDv5 Decision Support tool
Pen-Link
Pensa
Pinpoint
PINWALE
Pipeline
PIRANHA
Plus
Polaris
PolyAnalyst
PowerDrill
Powerplant
PPS
Procon
Project Foundry
Proximity
PrudSys Discoverer
PTEK
QACTIS (Question-Answering for Cross-Lingual Text, Image, and Speech)
QANDA
Query Tree NG/Querytree
QUIET (QUery Improvement Elevation Technique)
QKS Classifier
Radiant Garnet
Rampart
Rational Rose
Raven
Razor
REES
Remedy
Renoir/Renoir+
REPAST
Rigel
RMS
ROSID (Rapid Open Source Intelligence Deployment System)
ROVER
RPS
S-PLUS
SAFE
SaffronNet
Saffron Web
SAIL Labs Media Mining (MM) and Communications Mining (CM) Tool
SameTime
Sandbox
Sander
SANDKEY.
SAS/SAS Enterprise Miner
SAVANT (Systematic Architecture for Virtual Analytic Net-centric Threat Information):
Scenario
SeaLink/SeaWatch
SEAS (Structured Evidence Argumentation System)
See 5/C5.0
Semantic Forests
Semantic Navigator
Semantic Web
SEMESTER
Semio Taxonomy
SERIF (Statistical Entity & Relation Information Finding)
SIAAD (Secure Information Access Analysis & Dissemination)
SIAM (Situational Influence Assessment Module)
Siena
SIFT
SIGINT on Demand
SKYWRITER
Slate
SmartDiscovery
SmartDiscovery Analysis Server
SmartDiscovery Awareness Server
SNAKE (Social Network Analysis for Knowledge Exploitation)
SOCIDS
SoNIA
Soundex
Sparkler
sphinxVision
SPIRE/Themeview
Springtide
Spotfire Pro
SPSS/Clementine
SpyGLAS
SS7
SSNAStandpoint
Starlight
StarTree
STK (Surge Toolkit)
Strategic Player
STRONG ANGEL
Subdue
SUMMAC (Summarization Analysis Conference)
Suspect Finder
Swarm
Sybase
Syllogic Data Mining
Symphony
SyNERA
Synergist
System Dynamic Modeling
SYSTRAN
TACS
TAG Manager (Thematic Argument Group Manager)
TAIC (Text Analysis International Corporation)
TAPAS (Threat Anticipation Program Agent-Based Simulation of Terrorist Motivations,
Objectives and Strategies)
TEES (Trainable Evidence Extraction System)
Tel-Scope
TER (The Easy Reasoner)
TERQAS (Time and Event Recognition for Question Answering Systems)
Teradata
TextWise
Themelink
ThingFinder
THREADS (Threat HUMINT Reporting, Evaluation, Analysis, and Display System)
Threat Tracker
TILADS (Terrorist Identification Linkage Analysis Database)
Timewall
TIMEX
Tina Tool
Tinman
TIRT
TKT (Tacit Knowledge Toolkit)
TMODS (Terrorist Modus Operandi Detection System)
TOLLS
Tom Sawyer
TouchGraph
Trailblazer
TravelNet
TRIDENT
TRIST ( The Rapid Information Scanning Tool )
Trusted Wisdom
TruTalk
TTKB
Ucinet
UWIL
Vantage Point
Verity Indexer
Verity K2E (Verity K2 Enterprise)
Verity Locales
Verity Profiler
Verona
VIA Repository
Viceroy
Virtual Situation Book
Viscovery SOMine
Visual Insights ADVIZOR
Visual Links
VisualMine
ViTAP
VizServer
VKB (Virtual Knowledge Base) FINTEL ISM
Voltaire
WAEWarlord
Watchtower
Watson Pro
Webster
Webtas (Web-based Time Line Analysis System)
WilmaScope
Windgrinder/WnGrinder
Wired
Wrangler
XMB (XML Metadata Browser)
XpertRule Miner
Yellowston