The primary threat to tactical and small team operations continues to be cyber exploitation. The threat can originate from a broad spectrum of sources and be directed from an unlimited number of vectors that change and adapt at a rapid rate. Over the past six years, AMS and its partners have developed a comprehensive offering comprised of technologies, training, and technical support for Special Forces Operators, Law Enforcement Officers, and Intelligence Agents conducting tactical operations in austere environments using host-nation, unsecured commercial, and compromised networks. We have trained hundreds of operators under the program names: Watson and Cyber Operator Greyhat — employing the most advanced methods and technologies for:

Cyber Triad copy

  • Multi-Source Collections and Analyses
  • Threat Vulnerability Assessments
  • Mobile Device Security and Exploitation Operations over Unsecured Wired and Wireless Networks
  • Encrypted Commercial Communications
  • Persistent Cyber Surveillance
  • Cyber Situational Awareness
  • Counter-Cyber Surveillance
  • Digital Forensics
  • Social Engineering Methods and Social Media Exploitation
  • Cyber Training Operations Open-Source Intelligence

TRAINING AND INSTRUCTIONwatson class photo

Training and instruction are the cornerstone of our Tactical Cyber Program. From the commander and decision maker to tactical operator to field service support team, AMS provides the instruction required to execute the mission. All of the courses listed below are readily customized to meet the unique needs of a customer.