Operations Intelligence
1 OCT 17: ALL SOURCE INTELLIGENCE
Update canvas image
Image uploaded by:
Group editing is not supported in IE8.
Sorry, group editing is not supported in your browser. Editing is supported in Internet Explorer 9 or later, Chrome, Safari, and Firefox.
Select Image Crop
Upgrade your browser in order to edit this page.
Edit
About
Analyzes multiple sources of information in developing, evaluating, and disseminating intelligence on potential threats to U.S. and allied forces.
Advises commanders on threats to US and allied forces and missions as well as Intelligence, Surveillance and
Reconnaissance (ISR) capabilities and employment. Provides analysis of adversary threat systems and intelligence expertise necessary to develop detailed execution plans for air, space, and cyberspace operations. Uses state-of-the-art technology to produce all-source intelligence, situation estimates, order-
of-battle studies, and other intelligence reports and studies. Assembles maps, charts, and performs threat analysis in support of mission planning. Prepares and presents intelligence reports and briefings. Conducts intelligence debriefings of US and allied military personnel involved in combat operations. Prepares mission reports. Participates in the installation-level Threat Working Group (TWG).
Conducts external intelligence training. Instructs aircrews, security forces, explosive ordinance disposal and
others on collecting and reporting requirements and procedures, recognition techniques, and assessing offensive and defensive weapon system capabilities. Assists Survival Evasion Resistance and Escape (SERE) and Life Support personnel in training evasion and recovery and code of conduct.
Assesses vulnerabilities of US forces’ telecommunications networks/information which could be collected and
exploited by adversaries. Systematically assesses data using analytical procedures to document threats, isolate existing/potential vulnerabilities, identify procedures for minimizing/eliminating vulnerabilities, and recommend Information Operations (IO) techniques to exploit vulnerabilities to a friendly advantage.
Edit
Advice on how to transfer to this specialty
What advice can you share on transfering to this specialty?
Most recent contributors: MSgt Rick"y-Bobby" Pelrine