...Regional Slating for Intelligence Military Occupational Specialities A Square Peg in a Square Hole Master Sergeant Paul R Carey CMR 445 Box 231 APO AE 09046 +49 0152 0425 2074 paulrcarey@gmail.com In a May 2015 edition of the Marine Corps times, the acting undersecretary of defense for personnel and readiness stated “this is a moment that calls for revolutionary change in the human resources practice of the DoD”. This article, and several other publications, including “Bleeding Talent: How the U.S. Military Mismanages Great Leaders and Why It's Time for a Revolution” by Tim Kane, have long called for change within the military personnel slating system, and have attributed a disturbing loss of talent to this anachronistic human resources system. Nowhere is this more evident than in the intelligence occupational specialities within the Marine Corps, where a lack of technical expertise within its intelligence specialists and counterintelligence/human intelligence fields have made Marine Corps intelligence a well-rounded enterprise, but an enterprise lacking in depth and specialization. To solve this experience shortfall and give commanders the tactical and technical expertise in specific geographic regions, Marines in intelligence military occupational specialities should be exclusively assigned to a geographic region for their career. The Regional Cultural Language and Familiarization (RCLF) program officially stood up in October 2012 through the publication of MARADMIN...
Words: 1186 - Pages: 5
...Local Law Enforcement Intelligence The world of local law enforcement intelligence has changed significantly since September 11, 2001. State, local, and tribal law enforcement agencies have been given a variety of new responsibilities to handle including intelligence as just one. The intelligence discipline has evolved significantly in recent years since 9/11. As these various trends have merged, increasing numbers of American law enforcement agencies have begun to explore, and sometimes embrace, the intelligence function. Law enforcement agencies should consider many new techniques in bettering their intelligence functions. This research paper will discuss law enforcement intelligence history, methods to integrate intelligence into their agency and resources to help with their departments function. To begin this research the first question to be asked should be that of what is law enforcement intelligence? “Law enforcement intelligence is the product of an analytical process that provides an integrated perspective to disparate information about crime, crime trends, crime and security threats and conditions associated with criminality” (Carter). In my opinion the term “law enforcement intelligence” is used and viewed improperly. The majority of people will take this term out of its context and confuse it with national intelligence. Law enforcement intelligence is often viewed as pieces of information about people, places, or events that can be used to provide insight about...
Words: 1188 - Pages: 5
...However the JCS J2 can support missions that jeopardize the security of the Nation in combination with Deepwater Horizon’s foreign ownership. The JCS J2 can be called upon to support current crisis events where foreign intelligence collection, analysis, production, and dissemination are needed. The inclusion of the JCS J2 on the Deepwater Horizon incident would provide valuable lessons and post-incident critiques. Improvements on Department of Defense communications and the identification of policy and authority issues can be addressed before the next man-made or natural disaster. The following paragraphs describe the JCS J2 response to the Deepwater Horizon...
Words: 1713 - Pages: 7
...Intelligence for the Twenty-First Century ALAN DUPONT Strategic discourse over the past decade has been dominated by a debate over the nature of future warfare and whether or not there is a ‘revolution in military affairs’ (RMA). Supporters contend that developments in military technology, especially precision guidance and high-speed data processing, in conjunction with advances in doctrine and strategy, will fundamentally transform the way in which future wars will be fought and privilege RMAcapable forces in the contest to achieve battlefield dominance.1 Sceptics, on the other hand, regard the RMA as being more evolutionary than revolutionary, and argue that many of the technical advances associated with the RMA do not necessarily presage a paradigm shift in warfare.2 However, all agree that timely, accurate and useable intelligence will be critical to the successful conduct of war in the twenty-first century, perhaps more so than in any previous era. It is surprising, therefore, how little academic attention has been devoted to the changes that are taking place in the technology, management and integration of the intelligence systems that will underpin any RMA. It is the contention of this article that the transformation of intelligence architectures, particularly in the West, is no less profound than that of the weapons, platforms and warfighting systems they are designed to support and enhance. Moreover, the cumulative weight of the changes in prospect will redefine the...
Words: 11896 - Pages: 48
...OPSEC Practical Exercise 1. The U.S. believes the Soviets first became aware of the Stealth fighter program and the signals intelligence satellite program by exploiting freely available information. What type of intelligence(s) functions did they use? Answer: Open Source Intelligence (OSINT). 2. At the beginning of the wars in Afghanistan and Iraq and present, we (the U.S.) used what type of intelligence function for targeting, mapping, and regional monitoring on the battlefield? Answer: Imagery Intelligence (IMINT). 3. What type of intelligence functions include overt, sensitive, and clandestine activities and the individuals who exploit, control, supervise, or support these sources? Answer: Human Intelligence (HUMINT). 4. Department of Energy's national laboratories are a target of friends and foe because of their emphasis on the development of advanced technologies, many of which have military applications. What type of intelligence function is it? Answer: Technical Intelligence (TECHINT). 5. What type of intelligence is the culmination of the intelligence cycle and incorporates information derived through HUMINT, SIGINT, IMINT, MAS1NT, and OSINT? Answer: All Source Intelligence. 6. Your intelligence analyst told you he is observing a unit that travels to its refueling point the same time and way every day, and he believe you can destroy them with one air strike this time tomorrow. This unit is displaying which OPSEC indictor? Answer: An exposure. ...
Words: 723 - Pages: 3
...Maurice E. Simmons INTL 303: Introduction to Intelligence 28 December 2014 American Military University Many of the intelligence community’s (IC) greatest triumphs can be traced back to the use of multiple intelligence methods. As Clark so eloquently stated, “The game of intelligence collection is a multidisciplinary endeavor.” Employment of multiple platforms, sensors, and techniques provides advantages for the analyst to produce valuable strategic intelligence. Collaborative intelligence not only creates accurate and timely information, collaborative intelligence can also reduce wasteful endeavors. For example, a Congressional directed staff committee recently found the IC must increase collaboration among its intelligence systems. On the other hand, information based on a single source is deficient, and does not produce qualitative assessments. According to Anissa Frini, “Stovepiping keeps the output of different collection systems separated from one another and thus, it prevents one discipline from cross-checking another.” The lack of collaborated intelligence can lead to erroneous reporting and deception by the adversary. In order for policymakers to formulate strategic plans, information or rather intelligence gathered must have a holistic and integrated perspective. This paper will begin by highlighting the value of strategic intelligence to policymakers and leadership, the advantages of employing multiple intelligence methods, and will focus on analysis based...
Words: 2641 - Pages: 11
...Final Essay Assignment James Peterson What biases, if any, might be common to U.S. intelligence agencies? Give two examples from history or modern day? & Explain what role policymakers play and what problems they face in relation to threat analysis. Course: INTL634 March 3, 2013 What biases, if any, might be common to U.S. intelligence agencies? Give two examples from history or modern day? There are a number of different types of bias mentioned in our text books. In their book, “Analyzing Intelligence” Bruce and Bennett discuss the denial and deception (D&D) bias traps than an analyst can fall into. They mention that there are three major categories: 1) Cultural and personal bias; 2) Organizational bias; & 3) Cognitive heuristics bias. Such biases can taint the analysts opinions based on their type of biases. (George & Bruce. 2008, 127-130) Cultural and personal bias may allow the perception of the intelligence to be tainted by personal beliefs and pre-conceptions that the analyst has developed over his lifetime. This type of bias also may be influenced by personal experiences, morals, customs, habits, and social environments. Organizational bias is “generally associated with the limitations and weaknesses of large bureaucratic organizations”. This type of bias is the result of actual or perceived goals, policies, and traditions of an organization. Bruce also says that the differences are even more extreme when “classified information” is involved...
Words: 2232 - Pages: 9
...Be Fought in the 21st Century Intelligence in Recent Public Literature Nicholas Negroponte, head of MIT’s Media Lab, observed that the information age is fast replacing atoms with bits; movies on film with packets on the Internet; print media with digital media; and wires with digital radio waves. Negroponte does not apply the bits-for-atoms principle to warfare, but Bruce Berkowitz, in The New Face of War, does. According to Berkowitz, a senior analyst at RAND and a former intelligence officer, future wars will not be won by having more atoms (troops, weapons, territory) than an opponent, but by having more bits . . . of information. Berkowitz argues that atoms that used to be big winners will become big losers to information technology. Reconnaissance sensors will quickly find massed troops, enabling adversaries to zap those troops with precision-guided weapons. Fortifications will tie armies down to fixed locations, making them sitting ducks for smart bombs. Cheap cyber weapons (e.g., computer viruses) will neutralize expensive kinetic weapons (e.g., missile defenses). Berkowitz sums up the growing dominance of bits over atoms: “The ability to collect, communicate, process, and protect information is the most important factor defining military power.” The key word here is: “the most important factor.” The New Face of War gives many historical examples of information superiority proving to be an important factor in defining military power, such as the allies breaking...
Words: 1344 - Pages: 6
...correction. Outstanding attendance record and dependability. • Administrative Skills • Good Communication Skills (Written and Verbal) • Strong Organizational and Prioritization Skills • Ability to Multi-Task • Preparation of Reports and Presentations • Basic Project Management Skills • Attention to Detail • Excellent Problem Solving Technical Skills • MS Office XP and Outlook Express • Average User of Word, and Excel • Internet Navigation and Research • Type 65+ WPM • Proficient with MIDB, QueryTree, Google Earth, Analyst Notebook, Palentir, ArcGIS, Intelink, M3, FireTruck, and mIRC • Work History and Responsibilities Oct 2010 to Present United States Air Force Wright Patterson AFB, Ohio Operational Intelligence Analyst Global Threat Group • Responsible for documenting and tracking various AF reports; managing multi-system databases, lead training expert on several systems and database programs, as well as liaison to all upper ranking personnel Apr 2011 through May 2011 United States Air Force Balad AB, IZ All-Source...
Words: 842 - Pages: 4
...(Potts) Ana Belen Montes – The “Queen of Cuba” 11 February 2014 * Montes blindsided the intelligence community with blatant acts of treachery. Montes was the pinnacle Analyst for the Defense Intelligence Agency (DIA), yet, in her secret life, her true fervor showed as she worked for Fidel Castro and the Cuban Intelligence Services, Dirección de Inteligencia, (DI), translated in English as the Intelligence Directorate of Cuba. Montes listened to coded messages over shortwave radio, passed secret files to handlers in busy public locales, and snuck into the Communist country adorned with a fake passport. “Your honor, I engaged in the activity that brought me before you because I obeyed my conscience rather than the law. I believe our government's policy towards Cuba is cruel and unfair, profoundly unneighborly, and I felt morally obligated to help the island defend itself from our efforts to impose our values and our political system on it.” (Montes, 2012) Montes gave this statement to the presiding judge who presided over Magistrate Number: 01-0568M. (United States of America versus Ana Belen Montes, Defendant., 2002) Montes showed no remorse, no contrition, and no regret for her actions through her career as an agent for the DI. The purpose of this brief is to explain the life, career working for the United States (U.S.) Government and Cuban government, the downfall which resulted, and the sentencing of DIA Analyst General Schedule (GS)-14 Ana Belen Montes...
Words: 3749 - Pages: 15
...WHITE PAPER MATURING A THREAT INTELLIGENCE PROGRAM Discover the state of your threat intelligence capabilities and uncover a roadmap to getting ahead of today’s threats. The threat intelligence landscape is an emerging one. Even in the most sophisticated IT organizations, resource constraints often dictate that threat intelligence (TI) is the responsibility of a sole analyst sifting through incident alerts looking for patterns and trends which may indicate that a threat exists. Threat intelligence is more than that. Yet, with very few industry standards around what TI is and what it isn’t, we feel Gartner’s definition[1] comes the closest: “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard.” The Need to Know Clearly, going beyond simple event-based data analysis is a prerequisite for any useful threat intelligence program. The problem is that many organizations don’t know enough about the threats they face or their own security posture to defend themselves adequately. Instead they’re stuck in a reactive “stop the bleeding” or compliance-driven approach to cyber security with no clear vision or blueprint for reaching any other state. So it goes that in the rush to keep up with the TI trend, organizations are purchasing standalone...
Words: 3324 - Pages: 14
...year 2009 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes. 1 Be it enacted by the Senate and House of Representa- 2 tives of the United States of America in Congress assembled, 3 4 SECTION 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE.—This Act may be cited as the 5 ‘‘Intelligence Authorization Act for Fiscal Year 2009’’. 6 (b) TABLE OF CONTENTS.—The table of contents for hsrobinson on PROD1PC76 with BILLS 7 this Act is as follows: Sec. 1. Short title; table of contents. Sec. 2. Definitions. TITLE I—BUDGET AND PERSONNEL AUTHORIZATIONS VerDate Aug 31 2005 21:15 Jul 18, 2008 Jkt 069200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6211 E:\BILLS\H5959.PCS H5959 2 Sec. Sec. Sec. Sec. Sec. Sec. 101. 102. 103. 104. 105. 106. Authorization of appropriations. Classified Schedule of Authorizations. Personnel ceiling adjustments. Intelligence Community Management Account. Limitation on the use of covert action funds. Prohibition on use of funds to implement ‘‘5 and out’’ program of the Federal Bureau of Investigation. TITLE II—CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM Sec. 201. Authorization of appropriations. Sec. 202. Technical modification to mandatory retirement provision of the Central Intelligence Agency Retirement...
Words: 24825 - Pages: 100
...Explain which International Relations theory is best suited to conducting strategic insight? Introduction In this paper, I will give a brief overview about Strategic Intelligence and in the process define the key terms so that there is no ambiguity about the topic being examined. I will define the concepts of strategy, insight and strategic intelligence before moving on to analyze the need for an international relations theory for conducting strategic insight. The paper will then explain constructivism and why it is the most appropriate theory for carrying out strategic insight. Strategy The concept of strategy has been around for as long as there have been organizations and wars. Strategy is a method or plan chosen to bring about a desired future, such as achievement of a goal or solution to a problem. 1Strategy is also about achieving and sustaining a position of lead over rivals through the successive capitalization of known or developing possibilities rather than restricting to any specific fixed plan designed at the onset. It can be said that strategy becomes a central plan through which an organization can affirm its essential continuity while at the same time purposefully handling its adjustment to the changing environment to gain competitive superiority. Strategy can also be viewed as a response to external opportunities and threats and to internal strengths and weaknesses; a means of achieving a long range competitive advantage, and a favorable...
Words: 2992 - Pages: 12
...Session 2 The Intelligence Process Information is material of every description, including that derived from observations, surveillance, reports, rumors, and other sources. The information itself may be true or false, accurate or inaccurate, confirmed or unconfirmed, relevant or irrelevant. Although the intelligence process requires that information be stored, organized, and retrieved, the production of intelligence requires much more. Intelligence is the product resulting from the collection, evaluation and interpretation of information. Thus, intelligence can be viewed as information to which something has been added. The something added is the result of analysis—an explanation of what the information means. Intelligence may be general or specialized in nature. General intelligence focuses on a broad range of criminal activities, typically in smaller agencies or jurisdictions. Specialized intelligence focuses on a particular type of criminal activity or entity, such as narcotics, industrial espionage, or organized crime. Intelligence has both tactical and strategic applications. Tactical intelligence is directed towards a short term law enforcement objective or active case, with an immediate impact in mind—arrest, forfeiture, seizure. Strategic intelligence deals with larger, more long-term issues and goals, such as the identification of major criminal individuals or syndicates, projections of growth in types of criminal activity, and the establishment...
Words: 2395 - Pages: 10
...Ability to present clear and concise information consistent with the targeted audience As the acting J1 and Staff officer for the Defense Intelligence Support Office-Afghanistan (DISO-A), I was required to present technical information in a variety of settings: through briefings, slide presentations, video teleconferences, Tandberg’s, meetings and/or emails for the Defense Forward Element (DFE), DISO-A Chief, Directorate Deployment Mission Managers (DDMM), Global Force Management Office, Deployment Readiness Center and J1 Rear. I also provided information via VTC and Tandberg on a weekly basis to the Staff Components at the Defense Intelligence Agency reference all personnel actions and status. Experience in reviewing and editing complex material As the Security Specialist, in my current organization, I am responsible for researching and analyzing Industrial and Special Security policies, thus advising management on compliance issues. In my capacity as A Cryptologic Technician Administrative Assistant, I had the opportunity to research and review classified documents and reports to make final determinations from protected disclosure. As the Staff Officer for DISO-A, I was responsible for reviewing and editing all award submissions, appraisals, extension request and any/all personal action request. Experience in managing projects As the Staff Officer for (DISO-A), I was responsible for developing and managing the implementation of submitting the NATO Medal...
Words: 458 - Pages: 2