Difference between revisions of "SEMWIKI"

From SEMWIKI
Jump to navigation Jump to search
Line 3: Line 3:
 
<br >
 
<br >
  
= JANUS =
+
= DEYANA =
  
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Situation Center</h2>
+
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Targeting System</h2>
  
* [[SITCEN|Situational Awareness]]
+
* Targeting Cycle
  
* [[INDACTS|Industry Activities]]
+
* Effects Assessment
  
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Command Center</h2>
+
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">DAISY</h2>
 
 
* [[Current Operations]] relate to active threats successful in their current targeting of JANUS 
 
 
 
* [[Assessments]] assessments based on the analysis performed for various areas of concern or interest
 
 
 
* [[Briefings]] current briefings related to the protection of JANUS and certain ongoing efforts
 
 
 
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Travel and Event Center</h2>
 
 
 
<div style="margin;5px; font-size:100%;">
 
* [[Travel Briefings]]
 
 
 
* [[Event Intelligence]]
 
 
 
* [[Event Proxy Attending]]
 
 
 
* [[Corporate Events]]
 
</div>
 
 
 
= REQUESTS  =
 
 
 
'''Task Oriented Intelligence''' varies greatly from '''event''' and '''discovered''' based intelligence.  For example the event oriented intelligence is often investigative and discovered is often identified from large amounts of information that has been analyzed for automatic recognition as being significant. 
 
 
 
Task orders are intelligence tasks which are instrumental to the intelligence cycle which involves the process in [[Intelligence Requirements|developing intelligence requirements]] which drives the intelligence tasks needed in the '''collection''' process. 
 
 
 
'''Intelligence tasks''' range from something as simple as asking a question to an '''intelligence request for information''' outlining specific and implied tasks and may require a high level of effort and time or required within hours.  The intelligence requirements each have at least one RFI associated with them.
 
--
 
Asking a question can be as simple and require the time taken to write a subject in an email message. 
 
 
 
An example of the way an Intelligence Request for Information can be used has several advantages when an organization is considering developing a new system or product that will involve a significant amount of resources and lifecycle process.  This would be something which could include tasks that would provide an idea of the emerging technologies, trends or efforts that may be soon or already available.  That task may be followed with conducting one or more components of a [[Blind Buy|blind buy operation]].
 
 
 
Submit a {{Question}} and the correct level of expertise will work in providing the answer.
 
 
 
Issue an {{Intelligence Request for Information|Intel Request}}. 
 
 
 
Operational activities require the appropriate {{OPCODE}} {{OPKEY}} maintained following the established protocols.
 
 
 
= TOOLSETS =
 
 
 
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Decision Support</h2>
 
 
 
* [[MCDA|Multi-Criteria Decision Making]] to support reaching our overall vision and strategic goals.
 
 
 
* [[Adversarial Understanding]] - '''Know your enemy''' (threat evaluation) involves analyzing adversarial organizations, capabilities, and tactics to identify vulnerabilities to exploit.
 
 
 
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Evaluation</h2>
 
 
 
* [[ASCOPE]] - Area, Structures, Capabilities, Organization, People, Events <b>(ASCOPE)</b> characteristics
 
 
 
* [[STORM]] - Security Threat, Target Operations, Resources, Movement <b>(STORM)</b> patterns
 
 
 
* [[Center of Gravity Analysis]]
 
 
 
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Analysis</h2>
 
 
 
* [[Vulnerability Analysis]]
 
 
 
* [[Organizational Analysis]]
 
 
 
* [[Threat Analysis]]
 
 
 
<h2 id="mp-otd-h2" style="margin:3px; background:#cedff2; font-size:120%; font-weight:bold; border:1px solid #a3b0bf; text-align:left; color:#000; padding:0.2em 0.4em;">Wargaming</h2>
 
 
 
* [[Scenario Design]]
 
 
 
* [[Exercise Development]]
 
 
 
* [[Response Manuals]]
 
 
 
* [[Lessons Learned]]
 
 
 
= FEED MANAGER =
 
 
 
Please use the correct [[FEEDMANAGER]] options to create or remove information from the '''REACHBACK''' Namespace and external resources.
 
 
 
[[Image:Screenshot 2016-08-04-23-20-51.png|420px|link= ]]
 
  
 +
* Computer Network Operations 
 
=LIBRARY =
 
=LIBRARY =
  

Revision as of 00:08, 15 April 2019

Consult the User's Guide for access and using this site.

[edit]

Targeting System

  • Targeting Cycle
  • Effects Assessment

DAISY

  • Computer Network Operations

Resources

Knowledge Base

Template:Knowledge Base