Operations Intelligence

1 OCT 17: ALL SOURCE INTELLIGENCE

Update canvas image

Image uploaded by:

MSgt Rick"y-Bobby" Pelrine

You don't have permission to edit.

You must be logged in.

Login Create Account

Group editing is not supported in IE8.

Sorry, group editing is not supported in your browser. Editing is supported in Internet Explorer 9 or later, Chrome, Safari, and Firefox.

Select Image Crop

You don't have permission to edit.

You must be logged in.

Login Create Account

Upgrade your browser in order to edit this page.

Edit Edit

About

Analyzes multiple sources of information in developing, evaluating, and disseminating intelligence on potential threats to U.S. and allied forces.

Advises commanders on threats to US and allied forces and missions as well as Intelligence, Surveillance and
Reconnaissance (ISR) capabilities and employment. Provides analysis of adversary threat systems and intelligence expertise necessary to develop detailed execution plans for air, space, and cyberspace operations. Uses state-of-the-art technology to produce all-source intelligence, situation estimates, order-
of-battle studies, and other intelligence reports and studies. Assembles maps, charts, and performs threat analysis in support of mission planning. Prepares and presents intelligence reports and briefings. Conducts intelligence debriefings of US and allied military personnel involved in combat operations. Prepares mission reports. Participates in the installation-level Threat Working Group (TWG).

Conducts external intelligence training. Instructs aircrews, security forces, explosive ordinance disposal and
others on collecting and reporting requirements and procedures, recognition techniques, and assessing offensive and defensive weapon system capabilities. Assists Survival Evasion Resistance and Escape (SERE) and Life Support personnel in training evasion and recovery and code of conduct.

Assesses vulnerabilities of US forces’ telecommunications networks/information which could be collected and
exploited by adversaries. Systematically assesses data using analytical procedures to document threats, isolate existing/potential vulnerabilities, identify procedures for minimizing/eliminating vulnerabilities, and recommend Information Operations (IO) techniques to exploit vulnerabilities to a friendly advantage.
Edit Edit

History of this career field

Be the first to add a description.

Edit Edit

Qualifications for this career field

Be the first to add a description.

Edit Edit

Best parts of having this specialty

What are the best parts of having this specialty?

Edit Edit

Worst parts of having this specialty

What are the worst parts of having this specialty?

Edit Edit

Advice on how to transfer to this specialty

What advice can you share on transfering to this specialty?

Most recent contributors: MSgt Rick"y-Bobby" Pelrine

Are you sure you wish to convert this post?

close