BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 14-6 UNITED STATES TRANSPORTATION COMMAND 5 FEBRUARY 2015

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 14-6 UNITED STATES TRANSPORTATION COMMAND 5 FEBRUARY 2015"

Transcription

1 BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 14-6 UNITED STATES TRANSPORTATION COMMAND 5 FEBRUARY 2015 Intelligence INTELLIGENCE SUPPORT TO FORCE PROTECTION COMPLIANCE WITH THIS PUBLICATION IS MANDATORY NOTICE: This publication is available electronically on the USTRANSCOM electronic library. RELEASABILITY: There are no releasability restrictions on this publication OPR: TCJ2-P Approved By: TCJ2 (CAPT David H. McAllister, USN) Supersedes: USTRANSCOMI14-6, 11 September 2013 Pages: 9 Distribution: e-publishing This instruction outlines the responsibilities of United States Transportation Command (USTRANSCOM) Intelligence Directorate and the assigned National Agency Representatives (NAR) to provide intelligence support to USTRANSCOM force protection efforts. It also outlines procedures to ensure timely delivery of mission-specific threat data to operational planners and warfighters supporting force protection missions. It applies to all USTRANSCOM personnel assigned to Scott Air Force Base, IL, the Transportation Component Commands (TCC), and Subordinate Commands. Refer recommended changes and questions about this instruction to the office of primary responsibility using Air Force Form 847, Recommendation for Change of Publication. Ensure that all records created as a result of processes prescribed in this instruction are maintained in accordance with USTRANSCOM Instruction 33-32, USTRANSCOM Records Management Program. SUMMARY OF REVISIONS This instruction updates the roles and responsibilities of the Intelligence Directorate (TCJ2) Divisions and National Agency Representatives (NARs) with equities in intelligence support to force protection. 1. References and Supporting Information. References, related publications, abbreviations, acronyms, and terms used in this instruction are listed in Attachment Responsibilities The Director of Intelligence (J2) is the intelligence program authority for the command. The J2 is also the delegated Transportation-Logistics Intelligence Enterprise (TIE) Director. As such, the J2 manages all Transportation-Logistics Intelligence Center (TIC) production elements and TIE activities The J2 establishes the command s overall intelligence policies and procedures to ensure USTRANSCOM, TCCs, and the DOD receive timely, tailored, threat data and transportationlogistics infrastructure analysis to support operations.

2 2 USTRANSCOMI 14-6, 5 FEBRUARY The J2 activities and efforts will include those enumerated in USTRANSCOM Instruction Critical Infrastructure Program TCJ2 Intelligence Operations Division (TCJ2-O) is the intelligence production management authority for USTRANSCOM, including the requirements management process. TCJ2-O shares the responsibility for production of worldwide transportation intelligence with DIA/DRI-1 and USTRANSCOM NGA Support Team, as production elements of the TIC. TCJ2-O will: Disseminate, as appropriate, pertinent threat information, as well as any other force protection-related intelligence traffic to the USTRANSCOM Operations and Plans Directorate s (TCJ3) Fusion Center Chief Provide subject matter expertise to USTRANSCOM Threat Working Group (TWG) meetings, and participate in other force protection meetings including Air Mobility Command s Threat Working Group, as appropriate. When directed, act as TCJ2 Chair of the USTRANSCOM TWG Along with the rest of the TIC production elements, develop responsive, integrated transportation-logistics intelligence to support USTRANSCOM's global mobility mission for respective combatant command theater areas of responsibility Provide current threat intelligence analysis on weapons of mass destruction, terrorist, foreign intelligence, criminal, and conventional threats to Defense Transportation System (DTS) assets, personnel and the infrastructures located in the respective combatant command theater areas of responsibility. Activities that affect United States persons are conducted within the constraints contained in Executive Order 12333, United States Intelligence Activities; Department of Defense (DOD) Directive , DOD Intelligence Activities; DOD Regulation R, Procedures Governing the Activities of DOD Intelligence Components that Affect United States Persons; and USTRANSCOM Instruction 90-4, Intelligence Oversight Program Coordinate with Current Intelligence Division (TCJ2-W), Counterintelligence and Human Intelligence Division (TCJ2-X), USTRANSCOM Force Protection Division (TCJ3-F), and appropriate NARs on all force protection intelligence requirements Use available national, theater, and local sources to answer requests Send response to requester, with courtesy copy to the Operations Requirements Branch (TCJ2-OR) to close out the tasking Submit a collection requirement for any part of the tasker not answerable in available sources and methods In conjunction with TCJ3-F and TCJ2-W, brief USTRANSCOM senior staff/tcc staffs/threat working groups on selected force protection intelligence as recommended by USTRANSCOM s Threat Working Group.

3 USTRANSCOMI 14-6, 5 FEBRUARY TCJ2-OR is the cognizant intelligence collection management authority for USTRANSCOM. TCJ2-OR supports current intelligence and long-term production requirements with a host of capabilities, products, and services. TCJ2-OR will: Initiate standard collection management procedures to task national intelligence, surveillance, reconnaissance and collection resources to satisfy force protection support requirements Work with NARs to advocate all USTRANSCOM collection requirements within their respective agencies Assess, prepare, and coordinate force protection intelligence requirements with TCJ3-F and Fusion Center personnel TCJ2-W is USTRANSCOM s 24-hour entry point to all TCJ2-O s capabilities and products. TCJ2-W performs indications and warning, and other relevant threat awareness aspects for USTRANSCOM and its TCCs. TCJ2-W will: Be the 24-hour focal point for all intelligence-related requirements, and serve as the primary intelligence interface between TCJ2 and the USTRANSCOM Operations and Plans Directorate s (TCJ3) Fusion Center to fulfill intelligence support to force protection requirements Review daily message traffic and conduct cross talks with theater intelligence watch centers to ascertain current force protection information potentially impacting USTRANSCOM assets and personnel. If TCJ2-W receives credible threat data, the Senior Watch Officer will notify the Current Intelligence Division Chief and the Fusion Center Chief. The Fusion Center Chief will notify any directorate as appropriate of an incident that concerns that directorate. As applicable, the Senior Watch Officer will notify the 618 th Air Operations Center (Tanker Airlift Control Center) Senior Intelligence Duty Officer, Military Surface Deployment and Distribution Operations Center, the Military Sealift Command Operations Center, and the Joint Enabling Capabilities Command TCJ2-X is the coordination authority for all Counterintelligence (CI) and Human Intelligence (HUMINT) matters between geographic combatant commands, service CI and HUMINT agencies, national-level CI and HUMINT organizations, and USTRANSCOM. TCJ2-X will: Coordinate all CI and HUMINT issues potentially impacting the command or the DTS In conjunction with TCJ2-O, TCJ2-W and TCJ3-F, analyze and disseminate information related to foreign intelligence, terrorist and criminal threats to USTRANSCOM, TCCs and the infrastructures that comprise the DTS Coordinate CI issues with Joint Staff /J2-X, the National Counterintelligence Executive, unified command CI coordinating authorities, Service CI and HUMINT agencies, and the

4 4 USTRANSCOMI 14-6, 5 FEBRUARY 2015 Federal Bureau of Investigation and other appropriate CI executors to ensure that the command's CI and HUMINT requirements are met Intelligence Plans and Programs Division (TCJ2-P) will provide policy guidance with respect to changes occurring in the intelligence community regarding force protection Foreign Disclosure Office (TCJ2-FDO) provides review and approval for all requested foreign visitors to the command, foreign exchange officer and liaison officer oversight, and reviews/approves all information for release or disclosure to foreign nationals. TCJ2-FDO will: Provide TCJ3-F with the foreign national's official foreign visit request and recommended USTRANSCOM area access in accordance with visit purpose, need to know, and visitor clearance level Oversee all foreign exchange officer and liaison officers assigned to USTRANSCOM. TCJ2-FDO will ensure each foreign officer has a USTRANSCOM sponsor. Provide the sponsor with a Delegated Disclosure Letter outlining what information may be shared with the foreign officer TCJ2-FDO must review and approve the all command information (briefs, memos, etc.) USTRANSCOM personnel plan to release (give) or disclose (tell) to any foreign national, which is Classified Military Information (CMI) or Controlled Unclassified Information (CUI) as defined in USTRANSCOM Instruction Where release of CMI or CUI information is requested pursuant to 5 United States Code Section 552 (The Freedom of Information Act), USTRANSCOM personnel shall consult with the USTRANSCOM FOIA Officer (TCJA-FO) and TCJ2-FDO prior to release Information on TCJ2-FDO procedures is available in USTRANSCOMI 14-8, Foreign Disclosure Program The Director of National Intelligence Representative facilitates integration and synchronization of all Intelligence Community (IC) NAR support for the command. The Director of National Intelligence Representative has agreed to: Facilitate IC responsiveness to command requirements and ensure the command is informed of the IC roles, missions, and capabilities. Facilitate the TCJ2 access to IC intelligence databases, analytic, programmatic, manpower capabilities, and verify the Office of the Director of National Intelligence support mission in peace, crisis, contingency, or war situations are appropriately addressed in a time-efficient manner Assist command leadership and directorates/organizations with the coordination, communication, and representation of command issues or requirements to the Office of the Director of National Intelligence and key agencies.

5 USTRANSCOMI 14-6, 5 FEBRUARY Help in leveraging IC s analysis and collection capabilities and enabling functions in direct support of command missions and assist in coordinating with the all national-level intelligence organizations as appropriate to foster partnership with the TCJ The Director of the Central Intelligence Agency (CIA) Representative supports the command elements by providing current intelligence, long-term production, and force protection requirements through a host of products, services, and direct access to their headquarters. The Director of the CIA Representative has agreed to: Advise the command, especially the TCJ2, on activities involving CIA clandestine HUMINT, joint CIA/military operations, and provide the full range of CIA clandestine HUMINT and all-source analytical products and services to assist in intelligence support to USTRANSCOM force protection decisions and recommendations Provide CIA Counterterrorism Center and National Counterterrorism Center analysis and comments on intelligence assessments Provide inputs to the command elements on CIA force protection collection capabilities and CIA all-source force protection assessments Respond in a timely fashion to intelligence information the command requests on force protection issues. NAR support and activities will support TCJ2 endeavors enumerated in USTRANSCOM Instruction Critical Infrastructure Program Provide comments from CIA clandestine HUMINT collectors on intelligence threat assessments Provide tailored CIA analytical studies to support TCJ2 decisions and recommendations Coordinate arrangements to pass force protection information to deployed units in foreign locations Highlight for CIA the command s equities and force protection requirements Enable, via interface with the CIA operations directorate and other CIA directorates, the acquisition of force protection information The National Security Agency (NSA)/Central Security Service (CSS) Representative (NCR), USTRANSCOM supports USTRANSCOM s force protection mission through a variety of Signals Intelligence (SIGINT) and Information Assurance (IA) products and services. Nothing in this instruction should be interpreted to conflict with NSA/CSS and host responsibilities delineated in the current memorandum of agreement between Commander USTRANSCOM and Director NSA. NCR USTRANSCOM has agreed to: Advise and assist USTRANSCOM on issues regarding the procurement, exploitation, use, and limitations of SIGINT in conducting force protection activities.

6 6 USTRANSCOMI 14-6, 5 FEBRUARY Provide guidance, expertise, and recommendations to facilitate leveraging SIGINT collection assets to support force protection activities Assist in identifying intelligence requirements or gaps that could be resolved, in part or completely, through SIGINT operations. Assist in drafting Information Needs for submission in the National SIGINT Requirements Process Review and downgrade NSA products, as appropriate, for release to support force protection activities Provide tailored SIGINT analysis upon request by TCJ As part of NSA s IA mission, provide technical advice and assistance regarding communications security, information systems security, and operational security to support USTRANSCOM force protection The National Geospatial-Intelligence Agency Representative supports USTRANSCOM force protection requirements with timely Geospatial Intelligence (GEOINT). The National Geospatial-Intelligence Agency Representative has agreed to: Provide imaged-based products and exploitation, as needed Advise TCJ2 and other offices on issues related to the National System for Geospatial Intelligence (NSG); and provide functional GEOINT management and guidance Assist TCJ2 in identifying, acquiring, and exploiting National Geospatial-Intelligence Agency geospatial information including maps, charts, and digital data Provide tailored geospatial information and imagery analysis upon request by USTRANSCOM or the TCCs The USTRANSCOM NGA Support Team will serve as a fully integrated TIC production partner and GEOINT mobility infrastructure element by responding to and coordinating TIC tasking and providing liaison to other NGA production offices as required Defense Intelligence Agency Senior Representative. The Defense Intelligence Agency Senior Representative (DSR) represents the Director, Defense Intelligence Agency, to USTRANSCOM and its components. The DSR supports the Intelligence Directorate long-term production, and force protection requirements through a host of products, services, and direct access to Defense Intelligence Agency headquarters. The DSR has agreed to: Provide reach back capability for intelligence support to the TCJ2 force protection support mission. Respond in a timely fashion to intelligence information requests from TCJ2 s force protection mission. 3. Procedures.

7 USTRANSCOMI 14-6, 5 FEBRUARY USTRANSCOM Directorates and the TCCs submit requests for information to TCJ2 in accordance with USTRANSCOM Instruction 14-3, Collection Requirements Management, and USTRANSCOM Instruction 14-4, Request for Information Procedures. TCJ2-OR is the TCJ2 focal point for normal duty hours requirements. TCJ2-W is the TCJ2 focal point for receiving all requests for information/inquiries after normal duty hours in support of TCJ3-F and TCJ3. TCJ2-W will notify appropriate TCJ2 personnel to ensure mission-critical information requests are handled expeditiously. The Senior Watch Officer will notify the TCJ3 of threats by relaying the information directly to the Fusion Center Chief, who is responsible for notifying the appropriate TCJ3 divisions, to include TCJ3-F. DAVID H. MCALLISTER CAPT, U.S. Navy Director of Intelligence

8 8 USTRANSCOMI 14-6, 5 FEBRUARY 2015 Attachment 1 GLOSSARY OF REFERENCES, ABBREVIATIONS, ACRONYMS, AND TERMS Section A References Executive Order 12333, United States Intelligence Activities Department of Defense (DOD) Directive , DOD Intelligence Activities DOD Regulation R, Procedures Governing the Activities of DOD Intelligence Components that Affect United States Persons USTRANSCOM Instruction 10-28, Critical Infrastructure Program USTRANSCOM Instruction 14-3, Collection Requirements Management USTRANSCOM Instruction 14-4, Request for Information Procedures USTRANSCOM Instruction 14-8, Foreign Disclosure Program USTRANSCOM Instruction 31-35, Threat Working Group USTRANSCOM Instruction 90-4, Intelligence Oversight Program Transportation Intelligence Enterprise Execute Order, ZAUG14 USTRANSCOM Operations Order (OPORD) Transportation Intelligence Enterprise (TIE) Operations, ZAUG14 Section B - Abbreviations and Acronyms AT Antiterrorism CI Counterintelligence CIA Central Intelligence Agency DCIP Defense Critical Infrastructure Program DIA Defense Intelligence Agency DNI Director National Intelligence DOD Department of Defense DSR Defense Senior Representative DTS Defense Transportation System GEOINT Geospatial Intelligence HUMINT Human Intelligence IC Intelligence Community NAR National Agency Representative NGA National Geospatial Intelligence Agency NSA/CSS National Security Agency/Central Security Service SIGINT Signals Intelligence TCC Transportation Component Command TCJ2 Intelligence Directorate TCJ2-FDO Foreign Disclosure Office TCJ2-O TCJ2 Intelligence Operations Division TCJ2-OR TCJ2 Operations Requirements Branch TCJ2-P Intelligence Plans and Programs Division TCJ2-W TCJ2 Current Intelligence Division TCJ2-X TCJ2 Counterintelligence and Human Intelligence TCJ3 Operations and Plans Directorate TCJ3-F Force Protection Division TWG Threat Working Group

9 USTRANSCOMI 14-6, 5 FEBRUARY USTRANSCOM United States Transportation Command Section C Terms Antiterrorism Defensive measures used to reduce the vulnerability of individuals and property to terrorist acts, to include rapid containment by local military and civilian forces; also called AT. Counterintelligence Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons or their agents, or international terrorist organizations or activities; also called CI. Defense critical infrastructure Department of Defense and non-department of Defense networked assets and facilities essential to project, support, and sustain military forces and operations worldwide; also called DCI. Defense Transportation System That portions of the worldwide transportation infrastructure that supports Department of Defense transportation needs in peace and war; also called DTS. Geospatial intelligence The exploitation and analysis of imagery and geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the Earth. Geospatial intelligence consists of imagery, imagery intelligence, and geospatial information; also called GEOINT. Human intelligence A category of intelligence derived from information collected and provided by human sources; also called HUMINT. National Security Agency/Central Security Service Representative The senior theater or military command representative of the Director, National Security Agency/Chief, Central Security Service in a specific country or military command headquarters who provides the Director, National Security Agency, with information on command plans requiring cryptologic support. The National Security Agency/Central Security Service representative serves as a special advisor to the Combatant Commander for cryptologic matters, to include signals intelligence, communications security, and computer security; also called NSA/CSS. Signals Intelligence 1. A category of intelligence comprising of either individually or in combination all communications intelligence, electronic intelligence, and foreign instrumentation signals intelligence, however transmitted. 2. Intelligence derived from communications, electronic, and foreign instrumentation signals; also called SIGINT.

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.10E March 24, 2006 USD(I) SUBJECT: Intelligence Support to Personnel Recovery References: (a) Title 10, United States Code (b) Title 50, United States Code

More information

Department of Defense INSTRUCTION. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

Department of Defense INSTRUCTION. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI) Department of Defense INSTRUCTION NUMBER 5200.01 April 21, 2016 USD(I) SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI) References: See Enclosure 1

More information

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT) Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:

More information

v Department of Defense INSTRUCTION SUBJECT: Countering Espionage, International Terrorism, and the Counterintelligence (CI) Insider Threat

v Department of Defense INSTRUCTION SUBJECT: Countering Espionage, International Terrorism, and the Counterintelligence (CI) Insider Threat v Department of Defense INSTRUCTION NUMBER 5240.26 May 4, 2012 Incorporating Change 1, Effective October 15, 2013 SUBJECT: Countering Espionage, International Terrorism, and the Counterintelligence (CI)

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.21 March 18, 2008 DA&M SUBJECT: Defense Intelligence Agency (DIA) References: (a) Title 10, United States Code (b) Title 50, United States Code (c) Executive

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3305.09 June 13, 2013 USD(I) SUBJECT: DoD Cryptologic Training References: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive 5143.01

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3305.15 August 13, 2015 USD(I) SUBJECT: DoD Human Intelligence (HUMINT) Training and Certification References: See Enclosure 1 1. PURPOSE. In accordance with the

More information

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1 US Intelligence Community 2005-6 Thomas Patrick Carroll 1 Policy (defn): (a) General course of action, selected from among alternatives, intended to guide present and future decisions. (b) A highlevel

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3000.05 September 16, 2009 USD(P) SUBJECT: Stability Operations References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive (DoDD) 3000.05

More information

Department of Defense DIRECTIVE. SUBJECT: The National Security Agency and the Central Security Service

Department of Defense DIRECTIVE. SUBJECT: The National Security Agency and the Central Security Service Department of Defense DIRECTIVE NUMBER 5100.20 December 23, 1971 Incorporating Through Change 4, June 24, 1991 SUBJECT: The National Security Agency and the Central Security Service ASD(I) Reference: (a)

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary

More information

Military Intelligence

Military Intelligence Military Intelligence THROUGHOUT its history, the United States has maintained an intelligence capability principally to meet the needs of its military. These needs have been, and are today, wide-ranging

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance with sections 113 and 131 through

More information

Note: This compilation of the National Security Act of 1947 reflects amendments enacted into law through Public Law 110 53 (August 3, 2007).

Note: This compilation of the National Security Act of 1947 reflects amendments enacted into law through Public Law 110 53 (August 3, 2007). Note: This compilation of the National Security Act of 1947 reflects amendments enacted into law through Public Law 110 53 (August 3, 2007). These materials are not official evidence of the laws set forth

More information

TITLE III INFORMATION SECURITY

TITLE III INFORMATION SECURITY H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 7045.14 January 25, 2013 USD(C) SUBJECT: The Planning, Programming, Budgeting, and Execution (PPBE) Process References: See Enclosure 1 1. PURPOSE. This Directive:

More information

UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, DC 20301-5000

UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, DC 20301-5000 UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, DC 20301-5000 INTELLIGENCE July 8, 2013 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF UNDER SECRETARIES

More information

Department of Defense DIRECTIVE. SUBJECT: National Security Agency/Central Security Service (NSA/CSS)

Department of Defense DIRECTIVE. SUBJECT: National Security Agency/Central Security Service (NSA/CSS) Department of Defense DIRECTIVE NUMBER 5100.20 January 26, 2010 DA&M SUBJECT: National Security Agency/Central Security Service (NSA/CSS) References: See Enclosure 1 1. PURPOSE. Under the authorities vested

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5230.20 June 22, 2005 USD(P) SUBJECT: Visits and Assignments of Foreign Nationals References: (a) DoD Directive 5230.20, "Visits, Assignments, and Exchanges of Foreign

More information

Legislative Language

Legislative Language Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3020.40 January 14, 2010 Incorporating Change 2, September 21, 2012 USD(P) SUBJECT: DoD Policy and Responsibilities for Critical Infrastructure References: See Enclosure

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3204.01 August 20, 2014 USD(AT&L) SUBJECT: DoD Policy for Oversight of Independent Research and Development (IR&D) References: See Enclosure 1 1. PURPOSE. This

More information

Insider s Guide to Careers in Intelligence Analysis. hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst)

Insider s Guide to Careers in Intelligence Analysis. hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst) Insider s Guide to Careers in Intelligence Analysis hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst) December 17, 2009 Overview Presenter s Background Overview of Intelligence

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.06 May 17, 2011 Incorporating Change 1, May 30, 2013 USD(I) SUBJECT: Counterintelligence Awareness and Reporting (CIAR) References: See Enclosure 1 1. PURPOSE.

More information

Intelligence Officer Career Guide

Intelligence Officer Career Guide UNITED STATES COAST GUARD Intelligence Officer Career Guide Active Duty LTJG CAPT Table of Contents The General Development of an Officer... 3 Building the Intelligence Officer... 3 1. Training... 4 2.

More information

INTELLIGENCE AND ANALYSIS

INTELLIGENCE AND ANALYSIS OFFICE OF INTELLIGENCE AND ANALYSIS U.S. DEPARTMENT OF THE TREASURY WORKING AT OIA OIA S MISSION POSITION DESCRIPTIONS BENEFITS & CONTACT INFORMATION working at oia OIA officers support the formulation

More information

Guideline for Identifying an Information System as a National Security System

Guideline for Identifying an Information System as a National Security System NIST Special Publication 800-59 Guideline for Identifying an Information System as a National Security System William C. Barker I N F O R M A T I O N S E C U R I T Y Computer Security Division Information

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5205.02-M November 3, 2008 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 1. PURPOSE. In accordance with the authority in

More information

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350-1000 SECNAVINST 5510.36A N09N2 SECNAV INSTRUCTION 5510.36A From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 7750.07 October 10, 2014 DoD CIO SUBJECT: DoD Forms Management Program References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction (DoDI)

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference

More information

Counterintelligence Awareness Glossary

Counterintelligence Awareness Glossary Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity

More information

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD

More information

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015 BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015 Communications and Information DATA MANAGEMENT POLICY AND RESPONSIBILITIES COMPLIANCE WITH THIS

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE MISSION DIRECTIVE 39 7 MAY 2015 AIR FORCE OFFICE OF SPECIAL INVESTIGATIONS COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8310.01 February 2, 2015 DoD CIO SUBJECT: Information Technology Standards in the DoD References: See Enclosure 1 1. PURPOSE. In accordance with the authority in

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 63-1 AIR FORCE POLICY DIRECTIVE 20-1 3 JUNE 2016 Acquisition / Logistics INTEGRATED LIFE CYCLE MANAGEMENT COMPLIANCE WITH THIS PUBLICATION

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5525.18 October 18, 2013 USD P&R SUBJECT: Law Enforcement Criminal Intelligence (CRIMINT) in DoD References: See Enclosure 1 1. PURPOSE. This instruction: a. Establishes

More information

SAMPLE COURSE SYLLABUS*

SAMPLE COURSE SYLLABUS* DSS CENTER FOR DEVELOPMENT OF SECURITY EXCELLENCE (CDSE) EDUCATION DIVISION Managing a DoD Installation Security Program ED 507 SAMPLE COURSE SYLLABUS* A. DESCRIPTION The 2007 Defense Installations Plan

More information

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:

More information

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011 BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011 Communications and Information MANAGEMENT OF PORTALS AND WEB SITES COMPLIANCE WITH THIS PUBLICATION

More information

Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map

Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map Prepared by: Booz Allen Hamilton Career progression within the 0080-Information/Personnel

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8523.01 April 22, 2008 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) References: (a) DoD Directive C-5200.5, Communications Security (COMSEC) (U),

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.64 January 10, 2013 DA&M SUBJECT: Defense Contract Management Agency (DCMA) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 3305.09 May 27, 2014 USD(I) SUBJECT: Cryptologic Accreditation and Certification References: See Enclosure 1 1. PURPOSE. This manual: a. Provides accreditation guidance

More information

D E PAR TME NT OF THE NAVY OFFICE OF THE SECR ET A R Y 1000 N A VY PENT A G ON W A SHI N G T ON D C 20350-1000

D E PAR TME NT OF THE NAVY OFFICE OF THE SECR ET A R Y 1000 N A VY PENT A G ON W A SHI N G T ON D C 20350-1000 D E PAR TME NT OF THE NAVY OFFICE OF THE SECR ET A R Y 1000 N A VY PENT A G ON W A SHI N G T ON D C 20350-1000 SECNAVINST 5430.27D OJAG (Code 13) SECNAV INSTRUCTION 5430.27D From: Secretary of the Navy

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 1100.13 January 15, 2015 USD(P&R) SUBJECT: DoD Surveys REFERENCES: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive (DoDD) 5124.02

More information

DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE

DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:

More information

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job

More information

Security and Emergency Services Community of Interest 0089 Emergency Management Career Road Map

Security and Emergency Services Community of Interest 0089 Emergency Management Career Road Map Security and Emergency Services Community of Interest 0089 Emergency Management Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 0089 Occupational Series is Marked by Support

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8330.01 May 21, 2014 DoD CIO SUBJECT: Interoperability of Information Technology (IT), Including National Security Systems (NSS) References: See Enclosure 1 1.

More information

One Hundred Twelfth Congress of the United States of America

One Hundred Twelfth Congress of the United States of America S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.07 July 1, 2010 DoD SAPCO SUBJECT: Special Access Program (SAP) Policy References: See Enclosure 1 1. PURPOSE. This Directive: a. Reissues DoD Directive 5205.07

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 2311.01E May 9, 2006 Incorporating Change 1, November 15, 2010 Certified Current as of February 22, 2011 GC, DoD SUBJECT: DoD Law of War Program References: (a) DoD

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 1400.25, Volume 1100 January 3, 2014 USD(P&R) SUBJECT: DoD Civilian Personnel Management System: Civilian Human Resources Management Information Technology Portfolio

More information

Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)

Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS) Department of Defense DIRECTIVE NUMBER 4630.05 May 5, 2004 Certified Current as of April 23, 2007 ASD(NII)/DoD CIO SUBJECT: Interoperability and Supportability of Information Technology (IT) and National

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8910.01 May 19, 2014 DoD CIO SUBJECT: Information Collection and Reporting References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 09-36 September 2009 THE FEDERAL

More information

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)

More information

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.77 October 30, 2015 DCMO SUBJECT: National Guard Bureau (NGB) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary of Defense

More information

FACT SHEET. General Information about the Defense Contract Management Agency

FACT SHEET. General Information about the Defense Contract Management Agency FACT SHEET General Information about the Defense Contract Management Agency Mission: We are the independent eyes and ears of DoD and its partners, delivering actionable acquisition insight from the factory

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: National Defense Intelligence College University (NDIC NIU) NUMBER 3305.01 December 22, 2006 Incorporating Change 1, February 9, 2011 USD(I) References: (a) DoD

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 14-120 9 DECEMBER 2015 Intelligence TACTICS ANALYSIS AND REPORTING PROGRAM ACCESSIBILITY: COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

More information

Joint Publication 3-13.3. Operations Security

Joint Publication 3-13.3. Operations Security Joint Publication 3-13.3 Operations Security 04 January 2012 PREFACE 1. Scope This publication provides joint doctrine for planning, executing, and assessing operations security in joint operations. 2.

More information

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION UNITED STATES TRANSPORTATION COMMAND 9 JUNE 2015 COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION UNITED STATES TRANSPORTATION COMMAND 9 JUNE 2015 COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-46 UNITED STATES TRANSPORTATION COMMAND 9 JUNE 2015 Communications and Information JOINT DEPLOYMENT AND DISTRIBUTION ARCHITECTURE POLICY AND RESPONSIBILITIES

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5015.02 February 24, 2015 DoD CIO SUBJECT: DoD Records Management Program References: See Enclosure 1 1. PURPOSE. This instruction reissues DoD Directive (DoDD)

More information

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI Recommendation: The Executive Branch should provide for a central planning and coordination mechanism (likely within an existing entity)

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 7045.20 September 25, 2008 USD(P) SUBJECT: Capability Portfolio Management References: See Enclosure 1 1. PURPOSE. This Directive: a. Establishes policy and assigns

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 33-217 27 MAY 2014 Communications and Information VOICE CALL SIGN PROGRAM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications

More information

Department of Defense INSTRUCTION. 1. PURPOSE. In accordance with DoD Directive (DoDD) 5124.02 (Reference (a)), this Instruction:

Department of Defense INSTRUCTION. 1. PURPOSE. In accordance with DoD Directive (DoDD) 5124.02 (Reference (a)), this Instruction: Department of Defense INSTRUCTION NUMBER 6430.02 August 17, 2011 USD(P&R) SUBJECT: Defense Medical Materiel Program References: See Enclosure 1 1. PURPOSE. In accordance with DoD Directive (DoDD) 5124.02

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3305.13 February 13, 2014 USD(I) SUBJECT: DoD Security Education, Training, and Certification References: See Enclosure 1 1. PURPOSE. In accordance with the authority

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5215.1 October 25, 1982 Incorporating Change 1, November 16, 1994 SUBJECT: Computer Security Evaluation Center References: (a) DoD Directive 5200.28, "Security Requirements

More information

Defense Security Service

Defense Security Service Defense Security Service Defense Security Service Cybersecurity Operations Division Counterintelligence UNCLASSIFIED Defense Security Service DSS Mission DSS Supports national security and the warfighter,

More information

IN THE WAR ON TERRORISM

IN THE WAR ON TERRORISM THURSDAY, SEPTEMBER 19, 2002 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 FACT SHEET OVERVIEW OF INFORMATION SHARING INITIATIVES IN THE WAR ON TERRORISM Information Is the Best Friend of Prevention...

More information

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY

More information

IC Virtual Career Fair Participant Packet Thursday, March 3, 2016 Office of the Director of National Intelligence

IC Virtual Career Fair Participant Packet Thursday, March 3, 2016 Office of the Director of National Intelligence IC Virtual Career Fair Participant Packet Thursday, March 3, 2016 Office of the Director of National Intelligence Welcome and Thank You! Welcome to the seventh annual IC Virtual Career Fair and thank you

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

Table of Contents. Tab 3: Requirements, Planning, and Direction What Intelligence Can (and Cannot) Do...39 Who Uses U.S. Intelligence?...

Table of Contents. Tab 3: Requirements, Planning, and Direction What Intelligence Can (and Cannot) Do...39 Who Uses U.S. Intelligence?... i ii Table of Contents Tab 1: Intelligence Overview Defining and Using Intelligence...7 What is the Intelligence Community?...7 The Six Steps in the Intelligence Cycle...10 Tab 2: Intelligence Community

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5106.01 April 20, 2012 Incorporating Change 1, Effective August 19, 2014 DA&MDCMO SUBJECT: Inspector General of the Department of Defense (IG DoD) References: See

More information

U.S. DoD Physical Security Market

U.S. DoD Physical Security Market U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 4540.01 June 2, 2015 USD(P) SUBJECT: Use of International Airspace by U.S. Military Aircraft and for Missile and Projectile Firings References: See Enclosure 1

More information

Department of Defense MANUAL. DoD Information Security Program: Overview, Classification, and Declassification

Department of Defense MANUAL. DoD Information Security Program: Overview, Classification, and Declassification Department of Defense MANUAL NUMBER 5200.01, Volume 1 February 24, 2012 USD(I) SUBJECT: DoD Information Security Program: Overview, Classification, and Declassification References: See Enclosure 1 1. PURPOSE

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3001.02 May 3, 2010 USD(P&R) SUBJECT: Personnel Accountability in Conjunction With Natural or Manmade Disasters References: See Enclosure 1 1. PURPOSE. This Instruction

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 4140.67 April 26, 2013 USD(AT&L) SUBJECT: DoD Counterfeit Prevention Policy References: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive

More information

Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1

Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1 Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal

More information

Joint Publication Joint and National Intelligence Support to Military Operations

Joint Publication Joint and National Intelligence Support to Military Operations Joint Publication 2-01 Joint and National Intelligence Support to Military Operations 05 January 2012 PREFACE 1. Scope This publication provides doctrine for joint and national intelligence products, services,

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 1322.19 March 14, 2013 USD(P&R) SUBJECT: Voluntary Education Programs in Overseas Areas References: See Enclosure 1. 1. PURPOSE. This instruction: a. Reissues DoD

More information

Computer Network Security & Privacy Protection

Computer Network Security & Privacy Protection Overview Computer Network Security & Privacy Protection The Nation s electronic information infrastructure is vital to the functioning of the Government as well as maintaining the Nation s economy and

More information