703-813-2100 info@altamiracorp.com

Altamira’s solution teams are comprised of industry experts in areas ranging from applied engineering to developing state-of-the-art comms technology out of our New Mexico R&D lab. We pride ourselves in developing innovative, mission-focused solutions that solve the most complicated issues facing our customers.

CYBER OPERATIONSpic6-325x244 cyber02 

Cyberattacks continue to advance in rate and impact, with more organizations experiencing jarring compromises each year. The prevalence of modern ransomware puts your enterprise’s critical data at risk. Our cybersecurity solutions offer a complete approach to protecting your corporate information by securing your systems and fortifying your defense plan.

System Vulnerability Analysis
Reduce Your Attack Surface
We provide an in-depth assessment of your security posture by investigating the behavior of your systems. By closely examining source code and responses to brute force and fuzzing efforts, we can pinpoint the vulnerabilities within your network and offer a detailed view of your attack surface that drives focused efforts to strengthen your security mechanisms.

  • Recognition, inspection and assessment techniques
  • Software & Protocol Fuzzing
  • Embedded & Proprietary Systems Security Analysis
  • Fingerprinting
  • Source Code Review

Defensive Vulnerability Analysis (Defense Response Analysis)
Equip Your Network Defenses
Our penetration testing and Red Teaming approach puts your cyber operations to the test. We locate and trigger vulnerabilities in your computer network to engage and evaluate your defensive systems. Our efforts support the development of customized network defense tools while sharpening your cybersecurity teams’ ability to effectively identify and respond to advanced attacks.

  • Adversary characterization through Red and Blue teaming
  • Conduct research and analysis
  • Continual activity monitoring
  • Develop computer network defense tools

Computer Network Operations (CNO) Software Development
Advancing Our Approach for Your Security
Our detailed systems and malware analysis enables us to outpace modern cyber threats. For our penetration testing, we form exploits that effectively assess your cybersecurity systems by emulating real attacks. By staying ahead of real-world threat actors, we provide the expertise you need to defend against threats to your enterprise before they strike.

  • Embedded Systems Development
  • Mobile platforms
  • Linux/Unix Application & Kernel Development
  • Windows API, Network, and Kernel Driver Development
  • Code packing, Obfuscation, and Rootkit techniques
  • C, C++, Assembly (multiple processor families), Java, Python

Malware Analysis
Anticipating Active Threats
We help you avoid threats to your network by facing them ourselves. Finding and investigating active malware in the wild fuels our understanding of modern threat actors, allowing us to recommend the best security solutions to counter the cyberattacks of today and tomorrow.

  • Analysis of Zero-Day Vulnerabilities
  • Expertise with debuggers, disassemblers, and sniffers for malware triage
  • Post-mortem memory forensics
  • Analysis of protection mechanisms used by malware
  • Analysis of malicious software and documents

Mission System Support
Maintain Your Operations
Your mission requires 24/7 operations. Success depends on the uninterrupted movement of data across vast networks. All systems must function across a complex enterprise to ensure that your analysts get the critical information they need.

The constant release of new tools and infrastructure threatens the consistency of your vital day-to-day operations, pausing necessary functions and stalling actionable intelligence.

We offer mission system solutions that enhance the functionality of your infrastructure without jeopardizing time and action. We recognize the complex demands of your mission, and are able to integrate thousands of disparate data sources into a complex enterprise that spans networks of varying classifications. To protect the continuity of your operations, we evaluate systems through ongoing quality control testing that confirms proper integration, functionality, and dataflow. Our efforts safeguard your vital mission information and ensure that analysts receive data in a useable format, empowering them to complete the mission critical tasks your success requires.

  • Systems Engineering
  • System Integration and Administration
  • End-to-End dataflow
  • CNO testing

pic3-275x225-VisualizationBIG DATA ANALYTICS & VISUALIZATION

Extracting, storing, and visualizing knowledge from data is challenging and costly, especially in the face of growing data volumes. We build tools that help analysts perform these core analytic functions more quickly and effectively. We implement analysis tools in big data environments on cloud architectures so they are more scalable, performant, reliable, and secure. We aggregate and fuse data of all types to help analysts follow threads, correlate information, and find patterns. We introduce elements of automation to simplify the analytic process, so analysts can spend more time synthesizing knowledge versus reading and tagging documents, for example. We implement user interfaces with next generation web-based visualization tools, so analysts can perform analysis from any modern browser with network access to implemented services, so customers are not locked to proprietary appliances or thick-client interfaces. We also build on and release analysis and visualization tools as open source software, to minimize costs and maximize flexibility for our customers.

Multi-format data analysis
We build tools that automate extraction of knowledge from multi-format data. For example our solution Lumify (http://lumify.io) automatically extracts entities (“things”) such as people, organizations, locations, dates, times, and other semantic information from structured and semi-structured databases and spreadsheets, unstructured and semi-structured documents, PDFs, images, video, audio, and other data types. We even identify faces and other objects from images and video. We index all extracted knowledge so it can be searched immediately, providing more precision and utility than keyword-based searches. Lumify is also an fully open source solution, so it can be adopted without license costs or restrictions.

Graph visualization
Knowledge is embedded in data, whether in relational databases, streaming cyber data, or massive collections of files of all types. At a basic level of logic, this knowledge is in the form of resolved entities (“things”) that fall in semantic categories (“concepts”), typically defined in a knowledge domain (“ontology”). Entities may also have properties, and entities may be linked or related in some way to other entities (“predicates”). For example, “ISIL” could be derived as a resolved entity of category “Terrorist Organization” that is linked to entity “Palymra Demolition on 24 August 2015” of category “terrorist attack” by predicate “implemented.” In other words, knowledge may be captured and fused as a large geo-temporal graph, with nodes “resolved entities” and edges “relationships” with dates and locations as properties. In this graphical form, analysts can ask question like: “What terrorist attacks occurred in 2015? Are there patterns in the attacks? Time of day? Day of week? Trend in location? Who is involved in attacks? Who are they related to?” Etc. We support the extraction and storage of graphical knowledge and visualization on a massive scale with SecureGraph and Lumify.  SecureGraph holds vast collections of graphical knowledge (entities, properties, relationships), and Lumify helps analysts populate and visualize the graph.

Geospatial visualization
Knowledge in data often has geospatial and temporal components. Most entities trace paths, or are singular points, in space and time. To make sense of large volumes of data, it often makes sense to look at extracted knowledge in space and time – for example, plotted on a map. Our solutions, such as Lumify, support this function.

pic7-645x125 AppDev02


Altamira has a long legacy of building and deploying advanced software applications.  Our clients in multiple agencies use products such as Blur and Lumifiy.  Now, with our new Software Development Center we are building and hosting big data applications in our private cloud.

Big Data Analytics
We develop advanced analytic tools for use in business and government.  We developed Blur, a big data search tool, and Lumify, an analytics platform that can be adapted to to any domain.

Mobile App Development
Our software team is experienced and developing and deploying mobile apps for government and commercial clients.

Cross Domain Solutions
We are experienced at designing, developing and deploying cross domain solutions for our government clients.   These solutions allow big data to be shared among multiple agencies in a secure manner that manages data confidentiality, integrity and availability.

Trusted Computing (Enterprise and Mobile Platforms)
We provide trusted computing solutions for mobile platforms and enterprise environments through various concepts and security controls.  We help our clients secure their information while fully taking advantage of the benefits that mobile technologies (laptops, tablets, smartphones, etc.) offer, but also implementing these concepts into enterprise environments.  By addressing the security risks associated with the increase in mobile platform use we can be pro-active in developing cutting edge solutions.  Altamira has extensive experience engineering solutions that provide secure mobility capability and secure enterprise solutions.  Altamira has specific experience in the following areas; Authentication, Data at Rest Protection (encryption), Virtualized Platforms and Services, TPM/HSM, Wireless/Location Awareness, and Mobile Platforms.

Data At Rest
Data At Rest is a large problem for Mobile devices. While desktops and laptops can achieve multiple layers of encryption, this has been found to be far more difficult on a mobile device. A device which receives the Mobile Device Functional (MDF) Protection Profile certification will have one layer of full disk encryption. However, in order to protect data on the device, two layers of DAR protection is required. The second layer of DAR can be a second full disk encryption or a file encryption layer. The operational concept of the device allows for the specific capabilities to be active during operations, so any additional layer of DAR will need to allow these capabilities to remain active. Altamira provides custom solutions It should not be a customized solution to address Data At rest across multiple platforms and devices.

Virtualized Services
Protecting Data-in-transit (DIT) requires multiple layers of protection. VPN technology is used as the outer tunnel, and an application is expected to provide a tunnel for the second layer. Altamira uses open-source and commercial products to add additional layers of encryption for DIT protections via virtualization technologies. The virtualization technologies allow Altamira to add encryption which adds a second layer of protection.


We support our customers with next generation technologies across leading cloud architectures, from the hardware layer to web-based user interfaces. We engineer private (customer hosted) and public (typically Amazon Web Services) cloud compute clusters and services for Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). We build on leading open source tools such as CentOS, OpenStack, Mesos, and Docker to ensure our customers maintain a high level of performance, scalability, high availability, and affordability.

On top of private and public cloud-based architectures, we implement solutions that help make sense of big data – high volume, high velocity, and high variety data (the Three Vs). We are experts in open source tools such as Storm, Spark, and Hadoop that enable streams, in-memory, and batch-based distributed processing of high volume data on large compute clusters. We are experts in open source tools such as Accumulo and HBase that support indexing and analysis of massive volumes of data. We implement algorithms to extract information from structured data, unstructured text, imagery, video, and audio in big data environments using tools such as OpenNLP, OpenCV, Mahout, Sphinx, Tesseract, and R. We also contribute to the open source big data community. For example we created the big data relational search tool Blur (https://incubator.apache.org/blur),  graph database SecureGraph (http://securegraph.org), and data analysis and visualization tool Lumify


MULTI-INT ANALYSISpic8-250x429 MultiINT01

Altamira is an industy leader partnering with our customers to develop state of the art analysis tools and techniques for all of the Air Force ISR and NTM sensors. Our teams have been leading the community in developing  Activity Based Intelligence and content dominant analysis.

PIR and Thermal
Altamira provides expertise in phenomenology, algorithm development, and data analysis techniques for PIR and thermal imaging, and non-imaging modalities. We contribute to the development of the PIR ground architecture through advances in integration and interoperability. These developments enhance the ground operations more efficient, effective, and interoperable.

Our scientists and engineers developed new scientific techniques and methods to produce innovative new applications and product lines from NASIC’s data streams. Subject matter experts provided mentoring and ad hoc training on complex problems and advanced analysis techniques.

The Persistent Infrared (PIR) mission area is supports the Department of Defense (DOD) and intelligence community (IC) to ensure that missile threats are detected and reported to decision makers in a timely and relevant manner.

Multi-Spectral/Hyper Spectral
Altamira provides exploitation of hyperspectral and multispectral imagery that are in widespread use in the remote sensing community.

We provided instructions on the techniques and tools used in the processing, exploitation, and dissemination (PED) process including a certification program, training sessions, and a qualification program.

High quality image exploitation by our analysts provides extensive target detection, discrimination and tracking capabilities, reducing decision timelines for warfighters.

Scientists and analysts processed, exploited, and disseminated Over the Horizon (OTH) radar data analysis and supported ionospheric modeling, analyzed and exploited Ground Moving Target Indicator (GMTI) data and performed GMTI analysis that was integrated with GEOINT sensor data. In addition, we provide Synthetic Aperture Radar imagery analysis and exploitation to provide valuable intelligence to warfighters.

Forensic analysts contributed to the preparation of analytical and technical reports and publications, preparation of graphics and maintenance databases, summary data and spreadsheets and other formats as required.

Altamira’s Applied Engineering approaches problems with fundamental science and mathematical techniques to develop new innovative and often disruptive technologies in RF electronics, Antenna technology and signal processing. The Applied Engineering group is centered in Las Cruces, NM and provides design, simulation, modeling, prototyping, measurement and validation services both internally to Altamira and for DoD, IC and commercial customers. Altamira’s AE group has expertise, industry standard tools and recent past performance in Electronic Warfare, Electronic Protection, Sensors, Phased Arrays, Antenna, RF/Digital/Mixed Signal, Compressive Sensing, Machine Learning, and Machine Classification.

Direct Spatial Antenna Modulation (DSAM) – Spatial Information Control (SIC)
Altamira has developed and patented novel technologies and approaches to antenna use and signal control called Direct Spatial Antenna Modulation (DSAM) and Spatial Information Control (SIC), these techniques unlock order of magnitude enhancements vs the state of the art operation in the modern Congested, Contested and Anti-Access/Area Denial (A2/AD) spectrum environments.

Engineering Services
Altamira’s Applied Engineering group provides engineering design expertise in antenna/array/beamforming, communications, RF/digital/mixed electronics, software defined radio and digital signal processing domains. With in-house tools, expertise and experience rapidly implementing, and iterating engineering solutions from board level to platform level, and ranging from initial proof of concept to limited production. Altamira has the capabilities to prototype, measure and validate designs in-house, removing cost and expense from a solution lifecycle.

At the forefront of all Altamira engagements is our committment to Innovation. Nowhere is that more apparent than in the products we develop. Our current portfolio of technology products includes Lumify, our big data fusion, analysis, and visualization platform, and DSAM, a patented technology which greatly enhances the ability of operators, both human and machine, stay hidden when it matters most.


An alternative to proprietary data analysis platforms
Altamira Lumify is a big data fusion, analysis, and visualization platform that enables users to discover connections and explore relationships in their data via a suite of analytic options, including graph visualizations, full-text faceted search, dynamic histograms, interactive geospatial views, and collaborative workspaces shared in real-time. Lumify was designed with cloud-based architectures in mind. It works out of the box on Amazon’s AWS environment and can also run on most on-premise Hadoop stacks.

Open Data
You should have control over your intellectual property.  Knowledge generated in Lumify is easily accessible in the underlying database. Lumify stores your data in an open, published format that allows for easy use within other applications.

Map Integration
View your data geographically with map overlays. Pluggable map providers allow you to integrate your preferred GIS solution.

Graph Visualization
Analyze relationships, automatically discover paths between entities, and establish new links.

Live, Shared Workspaces
Organize your work into separate workspaces you can share with colleagues. Updates are pushed to everyone viewing the workspace in real-time.

Fine-Grained Security
Protect your data with separate access controls on entire entities, individual properties, and specific relationships.

Multimedia Fusion
Entities extracted from multi-media documents can be linked together with entities in the graph, the map and each other to provide a single coherent picture of your analytic task.

Analytic Helpers
Lumify offers a wide range of analytic functions that can be applied to a variety of tasks.  Add new analytic functionality as an independent agent. Once added to Lumify, the agent will monitor new information in the workspace, recognize if it can help, and work in the background to discover and highlight relevant information.

Lumify helps analysts fuse structured and unstructured data from myriad sources into actionable intelligence.


By visually linking data points related to a specific investigation, Lumify enables analysts to quickly discover important relationships across a variety of data sources, driving a more efficient process for gaining actionable intelligence.

DSAM Pic 001 500px

The Power of Direct Spatial Antenna Modulation (DSAM)

Altamira has developed and patented a novel framework and approach to controlling antenna arrays that allows not only power pattern control, but also destruction of information as a function of angle at the electromagnetic wave level. This ability to utilize Spatial Information Control (SIC) is a significant departure from traditional antenna array technologies, which preferentially direct or receive RF energy but do not act on the contained information. The ability to control the angular transmission or reception of information, in addition to the array power pattern, enables significant performance improvements in secure communications. SIC technology can be implemented in conjunction with existing protocols, waveforms, spread spectrum and cryptologic systems without impairment.

DSAM Secure Communications
DSAM Secure Communications is next generation technology that enables secure communication in a truly unprecedented manner. Traditional secure communications relies encryption and complicated waveform techniques, and require significant coordination and processing resources at both end of the link. DSAM allows information to be sent in a trusted direction, while the information is corrupted at the physical wave level when received from any other unauthorized angle. This technology can be applied on top of an existing secure link granting added security in unauthorized directions and allowing nominal operation in the intended direction.  Uniquely this technology can also be applied to communications when only a single side of the link is controlled, enabling increased communications security in situations inaccessible to traditional techniques.

DSAM Carrier 01 900pxDSAM Anti-Jam
DSAM Spatial Information Control (SIC) technology enables groundbreaking spatially selective anti-jam and interference mitigation capabilities. Traditional Anti-Jam Antenna Systems (AJAS) attempt to steer array pattern nulls towards a jamming source, but are limited to a fixed number of nulls and are only able to target jamming signals after they are identified. Advanced Spatial Information Control is capable of reducing jamming and interference power by an order of magnitude for an unlimited number of jamming and interference sources, including spectrally matched and coherent repeaters that traditional systems are unable to identify as hostile.

DSAM Geo Breaker
DSAM Spatial Information Control (SIC) Geolocation Prevention is next generation technology that degrades adversary abilities to perform direction finding and protects US military forces by preventing emitter geolocation. Geo breaker leverages Altamira’s groundbreaking ability to controllably and reconfigurably alter the information content and spectral properties of an RF transmission seen in different directions. Each adversary intercept site receives a uniquely corrupted version of the true transmission, implemented to reduce the cross-correlation of each intercept, preventing Time Difference of Arrival (TDOA) techniques from being effective.

DSAM Geo Breaker also prevents Angle of Arrival (AoA) geolocation techniques, with the unique ability to send different spectral content, and a spatially varying Doppler shift in directions away from the intended receiver. Adversary intercepts at different locations will fail to align in frequency or occupied bandwidth, preventing independent AoA solutions from combining to produce a positional fix.