Difference between revisions of "SEMWIKI"

From SEMWIKI
Jump to navigation Jump to search
Line 1: Line 1:
 
__NOTOC__ __NOEDITSECTION__
 
__NOTOC__ __NOEDITSECTION__
= DEADON =
+
<small>Consult the <b>[[User's Guide]]</b> for access and using this site.</small>
 +
<br >
  
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Semantic Targeting System</h2>
+
= JANUS =
  
= DAISY  =
+
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Situation Center</h2>
  
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Computer Network Operations</h2>
+
* [[SITCEN|Situational Awareness]]
 +
 
 +
* [[INDACTS|Industry Activities]]
 +
 
 +
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Command Center</h2>
 +
 
 +
* [[Current Operations]] relate to active threats successful in their current targeting of JANUS 
 +
 
 +
* [[Assessments]] assessments based on the analysis performed for various areas of concern or interest
 +
 
 +
* [[Briefings]] current briefings related to the protection of JANUS and certain ongoing efforts
 +
 
 +
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Travel and Event Center</h2>
 +
 
 +
<div style="margin;5px; font-size:100%;">
 +
* [[Travel Briefings]]
 +
 
 +
* [[Event Intelligence]]
 +
 
 +
* [[Event Proxy Attending]]
 +
 
 +
* [[Corporate Events]]
 +
</div>
 +
 
 +
= REQUESTS  =
 +
 
 +
'''Task Oriented Intelligence''' varies greatly from '''event''' and '''discovered''' based intelligence.  For example the event oriented intelligence is often investigative and discovered is often identified from large amounts of information that has been analyzed for automatic recognition as being significant. 
 +
 
 +
Task orders are intelligence tasks which are instrumental to the intelligence cycle which involves the process in [[Intelligence Requirements|developing intelligence requirements]] which drives the intelligence tasks needed in the '''collection''' process. 
 +
 
 +
'''Intelligence tasks''' range from something as simple as asking a question to an '''intelligence request for information''' outlining specific and implied tasks and may require a high level of effort and time or required within hours.  The intelligence requirements each have at least one RFI associated with them.
 +
--
 +
Asking a question can be as simple and require the time taken to write a subject in an email message. 
 +
 
 +
An example of the way an Intelligence Request for Information can be used has several advantages when an organization is considering developing a new system or product that will involve a significant amount of resources and lifecycle process.  This would be something which could include tasks that would provide an idea of the emerging technologies, trends or efforts that may be soon or already available.  That task may be followed with conducting one or more components of a [[Blind Buy|blind buy operation]].
 +
 
 +
Submit a {{Question}} and the correct level of expertise will work in providing the answer.
 +
 
 +
Issue an {{Intelligence Request for Information|Intel Request}}. 
 +
 
 +
Operational activities require the appropriate {{OPCODE}} {{OPKEY}} maintained following the established protocols.
 +
 
 +
= TOOLSETS =
 +
 
 +
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Decision Support</h2>
 +
 
 +
* [[MCDA|Multi-Criteria Decision Making]] to support reaching our overall vision and strategic goals.
 +
 
 +
* [[Adversarial Understanding]] - '''Know your enemy''' (threat evaluation) involves analyzing adversarial organizations, capabilities, and tactics to identify vulnerabilities to exploit.
 +
 
 +
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Evaluation</h2>
 +
 
 +
* [[ASCOPE]] - Area, Structures, Capabilities, Organization, People, Events <b>(ASCOPE)</b> characteristics
 +
 
 +
* [[STORM]] - Security Threat, Target Operations, Resources, Movement <b>(STORM)</b> patterns
 +
 
 +
* [[Center of Gravity Analysis]]
 +
 
 +
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Analysis</h2>
 +
 
 +
* [[Vulnerability Analysis]]
 +
 
 +
* [[Organizational Analysis]]
 +
 
 +
* [[Threat Analysis]]
 +
 
 +
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Wargaming</h2>
 +
 
 +
* [[Scenario Design]]
 +
 
 +
* [[Exercise Development]]
 +
 
 +
* [[Response Manuals]]
 +
 
 +
* [[Lessons Learned]]
 +
 
 +
= FEED MANAGER =
 +
 
 +
Please use the correct [[FEEDMANAGER]] options to create or remove information from the '''REACHBACK''' Namespace and external resources.
 +
 
 +
[[Image:Screenshot 2016-08-04-23-20-51.png|420px|link= ]]
 +
 
 +
=LIBRARY =
 +
 
 +
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Resources</h2>
 +
 
 +
* {{Organizational Resources}} - Browse '''repositories''' (Lessons Learned, Case Studies, etc) '''completed assessments''' and similar '''organizational memory''' items.
 +
 
 +
* {{Industry Resources}}
 +
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Knowledge Base</h2>
 +
{{Knowledge Base}}
 +
 
 +
<headertabs/>

Revision as of 23:59, 14 April 2019

Consult the User's Guide for access and using this site.

[edit]

Situation Center

Command Center

  • Current Operations relate to active threats successful in their current targeting of JANUS
  • Assessments assessments based on the analysis performed for various areas of concern or interest
  • Briefings current briefings related to the protection of JANUS and certain ongoing efforts

Travel and Event Center

Task Oriented Intelligence varies greatly from event and discovered based intelligence. For example the event oriented intelligence is often investigative and discovered is often identified from large amounts of information that has been analyzed for automatic recognition as being significant.

Task orders are intelligence tasks which are instrumental to the intelligence cycle which involves the process in developing intelligence requirements which drives the intelligence tasks needed in the collection process.

Intelligence tasks range from something as simple as asking a question to an intelligence request for information outlining specific and implied tasks and may require a high level of effort and time or required within hours. The intelligence requirements each have at least one RFI associated with them. -- Asking a question can be as simple and require the time taken to write a subject in an email message.

An example of the way an Intelligence Request for Information can be used has several advantages when an organization is considering developing a new system or product that will involve a significant amount of resources and lifecycle process. This would be something which could include tasks that would provide an idea of the emerging technologies, trends or efforts that may be soon or already available. That task may be followed with conducting one or more components of a blind buy operation.

Submit a Template:Question and the correct level of expertise will work in providing the answer.

Issue an Template:Intelligence Request for Information.

Operational activities require the appropriate Template:OPCODE Template:OPKEY maintained following the established protocols.

Decision Support

  • Adversarial Understanding - Know your enemy (threat evaluation) involves analyzing adversarial organizations, capabilities, and tactics to identify vulnerabilities to exploit.

Evaluation

  • ASCOPE - Area, Structures, Capabilities, Organization, People, Events (ASCOPE) characteristics
  • STORM - Security Threat, Target Operations, Resources, Movement (STORM) patterns

Analysis

Wargaming

Please use the correct FEEDMANAGER options to create or remove information from the REACHBACK Namespace and external resources.

420px

Resources

Knowledge Base

Template:Knowledge Base