National Guard Intelligence Activities

Total Page:16

File Type:pdf, Size:1020Kb

National Guard Intelligence Activities CCHHIIEEFF NNAATTIIOONNAALL GGUUAARRDD BBUURREEAAUU MMAANNUUAALL NGB-J2 CNGBM 2000.01 DISTRIBUTION: A 26 November 2012 NATIONAL GUARD INTELLIGENCE ACTIVITIES Reference(s): See Enclosure S. 1. Purpose. This manual describes how to implement policies contained in Chief National Guard Bureau (CNGB) Instruction (I) (CNGBI) 2000.01, National Guard (NG) Intelligence Activities (reference a), and establishes procedures for the conduct and oversight of National Guard Bureau (NGB), Joint Forces Headquarters-State (JFHQ-S) and NG Title 32 (T-32) intelligence and intelligence-related activities. Procedures and information contained herein are in accordance with (IAW) references b, c, and d. 2. Superseded/Canceled. None. 3. Applicability. This manual applies to all NGB, T-32NG JFHQ-S, and T-32 NG intelligence units and staff organizations, and T-32 non-intelligence organizations that perform intelligence or intelligence-related activities, as defined in the glossary, hereinafter referred to as the NG intelligence component. This manual does not apply to criminal investigations or authorize any intelligence activity not otherwise authorized by law. NG members serving in a Title 10 (T-10) status must comply with Service Component regulations. 4. Procedures. References b and d give clear guidance for ensuring the legality and propriety of all intelligence and intelligence-related activity. The application of reference d to NG intelligence components is required by NG policy because it gives specific guidance for conducting this activity through 15 procedures. Procedure 1 provides general guidance. Procedures 2 through 4 articulate the exclusive procedures through which Department of Defense (DoD) intelligence components, which includes the NG intelligence component IAW this manual, may collect, process, retain, and disseminate information concerning United States (U.S.) persons. Procedures 5 through 10 define UNCLASSIFIED CNGBM 2000.01 26 November 2012 procedures regarding the use of special collection techniques used to obtain information for foreign intelligence (FI) and counterintelligence (CI) purposes. Authority to employ these techniques is limited to that necessary to perform functions assigned to the DoD intelligence component concerned. Procedures 11 through 13 regulate other aspects of DoD intelligence activities, including oversight of those activities. Procedure 14 governs the training and official conduct of intelligence professionals and non-intelligence personnel engaged in intelligence and intelligence-related activities. Procedure 15 defines the requirement to report and investigate misconduct incident to intelligence and intelligence-related activities that violates the laws, policies, or regulations governing those activities. Specific procedural guidance is contained in Enclosure A. 5. Summary of Changes. This is the initial publication of CNGBM 2000.01. 6. Releasability. This manual is approved for public release; distribution is unlimited. NGB directorates, the Adjutants General (TAGs), the Commanding General of the District of Columbia, and NG JFHQ-S may obtain copies of this manual through www.ngbpdc.ngb.army.mil. 7. Effective Date. This manual is effective upon publication. Enclosures: A -- Procedural Guidance B -- National Guard Intelligence and Counterintelligence Missions C -- Intelligence Oversight Training Requirements D -- Domestic Operations E -- Domestic Imagery F -- Proper Use Memorandum Format G -- Amended Proper Use Memorandum Format H -- Private Corporation Letter of Consent Format I -- Private Individual Letter of Consent Format J -- Procedure 12 Memorandum Format K -- Intelligence Support to Force Protection L -- Multi-National and State Partnership Program Intelligence 2 CNGBM 2000.01 26 November 2012 Activities M -- Computer Networks N -- The Intelligence Oversight Continuity Binder O -- Compliance Inspection Guidance P -- The Intelligence Oversight Process Q -- Sample Intelligence Oversight Wallet Card R -- References GL -- Glossary 3 CNGBM 2000.01 26 November 2012 TABLE OF CONTENTS PART Page Purpose .................................................................................................... 1 Superseded/Canceled ............................................................................... 1 Applicability .............................................................................................. 1 Procedures ................................................................................................ 1 Summary of Changes ................................................................................ 2 Releasability ............................................................................................. 2 Effective Date ............................................................................................ 2 ENCLOSURE A -- PROCEDURAL GUIDANCE ............................................ A-1 Procedure 1: General ........................................................................... A-1 Procedure 2: Collection ........................................................................ A-1 Procedure 3: Retention ........................................................................ A-7 Procedure 4: Dissemination ................................................................. A-9 Procedure 5: Electronic Surveillance .................................................... A-10 Procedure 6: Concealed Monitoring ..................................................... A-11 Procedure 7: Physical Searches ........................................................... A-12 Procedure 8: Searches and Examination of Mail .................................. A-12 Procedure 9: Physical Surveillance ...................................................... A-13 Procedure 10: Undisclosed Participation in Organizations .................... A-14 Procedure 11: Contracting for Goods and Services ............................... A-17 Procedure 12: Provision of Assistance to Law Enforcement Authorities A-17 Procedure 13: Experimentation on Human Subjects for Intelligence Purposes ....................................................................... A-20 Procedure 14: Employee Conduct ........................................................ A-20 Procedure 15: Identifying, Investigating, and Reporting Questionable Intelligence Activity, Significant or Highly Sensitive Matters, and Crimes Reported to the Attorney General ......................................................................... A-21 ENCLOSURE B -- NATIONAL GUARD INTELLIGENCE AND COUNTERINTELLIGENCE MISSIONS ............................ B-1 Introduction ......................................................................................... B-1 Geospatial Intelligence/Imagery Intelligence ......................................... B-1 Signals Intelligence ............................................................................... B-1 Human Intelligence .............................................................................. B-1 Open-Source Intelligence ...................................................................... B-2 Measurements and Signatures Intelligence ........................................... B-2 Medical Intelligence .............................................................................. B-2 Counterintelligence .............................................................................. B-3 i CNGBM 2000.01 26 November 2012 ENCLOSURE C – INTELLIGENCE OVERSIGHT TRAINING REQUIREMENTS ........................................................... C-1 Training Requirements ......................................................................... C-1 Initial Training ................................................................................. C-1 Annual Refresher Training ............................................................... C-1 Pre-deployment/Temporary Duty Training ....................................... C-2 Training Development .......................................................................... C-2 Training Records .................................................................................. C-4 Additional Training Requirements for SIGINT Units .............................. C-4 ENCLOSURE D -- DOMESTIC OPERATIONS ............................................. D-1 Homeland Defense ............................................................................... D-1 Homeland Security ............................................................................... D-1 Defense Support of Civilian Authorities Intelligence Activities ............... D-1 General Information......................................................................... D-1 Search and Rescue .......................................................................... D-2 Incident Awareness and Assessment ................................................ D-2 National Guard Baseline Operating Posture .......................................... D-3 ENCLOSURE E -- DOMESTIC IMAGERY ................................................... E-1 General ................................................................................................ E-1 Domestic Imagery from National Satellites ............................................ E-2 Domestic Imagery from Airborne Platforms ........................................... E-2 Domestic Imagery from Commercial Satellites ...................................... E-2 Fighter, Bomber, Remotely Piloted Aircraft, Unmanned Aircraft System, and Unmanned Aerial Vehicle Navigational/Target
Recommended publications
  • Toward Integrated Dod Biosurveillance
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Arroyo Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity. Research Report Toward Integrated DoD Biosurveillance Assessment and Opportunities Melinda Moore, Gail Fisher, Clare Stevens Prepared for the United States Army Approved for public release; distribution unlimited The research described in this report was sponsored by the United States Army under Contract No.
    [Show full text]
  • Technology Innovation and the Future of Air Force Intelligence Analysis
    C O R P O R A T I O N LANCE MENTHE, DAHLIA ANNE GOLDFELD, ABBIE TINGSTAD, SHERRILL LINGEL, EDWARD GEIST, DONALD BRUNK, AMANDA WICKER, SARAH SOLIMAN, BALYS GINTAUTAS, ANNE STICKELLS, AMADO CORDOVA Technology Innovation and the Future of Air Force Intelligence Analysis Volume 2, Technical Analysis and Supporting Material RR-A341-2_cover.indd All Pages 2/8/21 12:20 PM For more information on this publication, visit www.rand.org/t/RRA341-2 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0633-0 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2021 RAND Corporation R® is a registered trademark. Cover: U.S. Marine Corps photo by Cpl. William Chockey; faraktinov, Adobe Stock. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors.
    [Show full text]
  • Dod Instruction 6420.01, March 20, 2009
    Department of Defense INSTRUCTION NUMBER 6420.01 March 20, 2009 Incorporating Change 1, Effective September 2, 2014 USD(I) SUBJECT: National Center for Medical Intelligence (NCMI) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive 6420.1 (Reference (a)) as a DoD Instruction in accordance with the authority in DoD Directive 5143.01 (Reference (b)); b. Re-establishes the Armed Forces Medical Intelligence Center as the NCMI for the conduct of medical intelligence within the Department of Defense, pursuant to Executive Order 12333 (Reference (c)), The National Security Act of 1947 (Reference (d)), and DoD Directive 5240.01 (Reference (e)). 2. APPLICABILITY. This Instruction applies to OSD, the Military Departments (including the Coast Guard at all times, including when it is a Service in the Department of Homeland Security by agreement with that Department), the Office of the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities in the Department of Defense (hereafter referred to collectively as the “DoD Components”). The term “Military Departments,” as used herein, refers to the Army, the Navy, the Air Force, the Marine Corps, and, as provided above, the Coast Guard (including Active and Reserve Components). 3. DEFINITIONS. For the purpose of this Instruction, the term “medical intelligence” is defined as the product of collection, evaluation, and all-source analysis of worldwide health threats and issues, including foreign medical capabilities, infectious disease, environmental health risks, developments in biotechnology and biomedical subjects of national and military importance, and support to force protection.
    [Show full text]
  • Trends and Challenges in Intelligence Education and Training
    International Conference KNOWLEDGE-BASED ORGANIZATION Vol. XXII No 1 2016 TRENDS AND CHALLENGES IN INTELLIGENCE EDUCATION AND TRAINING Iulian MARTIN, Antonio DAN-ŞUTEU National Defense University „Carol I”, Bucharest, Romania [email protected] Abstract: The education and lifelong learning of the intelligence analysts will provide the right ingredients to evolve into incredible and increasingly operational environment characterized by uncertainty and complex challenges. Based on diagnosis of the current ways of education and training in the field of intelligence analysis, there seems to be only a few higher education programs that focuses exclusively on law enforcement intelligence community. Most education and training programs are based on intelligence courses that incorporate multidisciplinary topics and a broad theoretical approach to intelligence issues. An efficient program should not only educate students by enabling them to learn how to perform an intellectual process for having analytical products, but it should also train them by teaching them the structures, techniques, and procedures associated with the intelligence process. Keywords: education, training, intelligence, analysis, process 1. Introduction University in 2002. This was followed by Major events in the wake of the the establishment of the College of new millennium have cast serious doubts Analytical Studies by the Federal Bureau over the ability of the intelligence of Investigation (FBI), as well as of the community to effectively address the National Intelligence University by the challenges posed by an increasingly Office of the Director of National globalized and rapidly changing world. Intelligence (ODNI). The latter was The failure to prevent the 9/11 terrorist designed as a ‘virtual’ institution attacks, as well as to accurately assess Iraq’s responsible for improving coordination Weapons of Mass Destruction program have between the training programs of different highlighted the need for significant intelligence agencies.
    [Show full text]
  • Understanding and Intelligence Support to Joint Operations
    JDP 2-00 JOINT DOCTRINE PUBLICATION 2-00 UNDERSTANDING AND INTELLIGENCE SUPPORT TO JOINT OPERATIONS Joint Doctrine Publication 2-00 (JDP 2-00) (3rd Edition), August 2011 is promulgated as directed by the Chiefs of Staff Assistant Chief of the Defence Staff (Development, Concepts and Doctrine) CONDITIONS OF RELEASE 1. This information is Crown copyright and the intellectual property rights for this publication belong exclusively to the Ministry of Defence (MOD). No material or information contained in this publication should be reproduced, stored in a retrieval system, or transmitted in any form outside MOD establishments except as authorised by both the sponsor and the MOD where appropriate. 2. This information may be subject to privately owned rights. i 3rd Edition, Change 1 JDP 2-00 AUTHORISATION The Development, Concepts and Doctrine Centre (DCDC) is responsible for publishing Joint Doctrine Publications (JDPs) within a hierarchy of similar publications. Readers wishing to quote JDPs as reference material in other work should confirm with the DCDC Doctrine Editor whether the particular publication and amendment state remains authoritative. Comments on factual accuracy or proposals for amendment are welcomed by the Doctrine Editor at: The Development, Concepts and Doctrine Centre Ministry of Defence Shrivenham SWINDON, Wiltshire, SN6 8RF Telephone number: 01793 314216/7 Military Network: 96161 4216/4217 Facsimile number: 01793 314232 Military Network: 96161 4232 E-mail: [email protected] DISTRIBUTION Distribution of JDPs is managed by the Forms and Publications Section, DSDA Operations Centre, C16 Site, Ploughley Road, Arncott, Bicester, OX25 1LP. Requests for issue of this publication, or amendments to its distribution should be referred to the DSDA Operations Centre.
    [Show full text]
  • Combat Intelligence
    u R«Ur 408.3. y^ 11/ Uto FM 3 O -ï> CJ kt*t»r. DEPARTMENT OF THE ARMY FIELD MANUAL COMBAT INTELLIGENCE HEADQUARTERS, DEPARTMENT OF THE ARMY The Pentatron.ÄfGffiy JANUARY 1960 Km 1A518. Patagón Washington, D.C. 20310 FM 30-5 C 1 FIELD MANUAL COMBAT INTELLIGENCE FM 30-5 HEADQUAETERS, DEPARTMENT OF THE ARMY Cil ANGES No. 1 WASHINGTON 25, D.C., « Jime 1961 FM 30-5,6 January 1960, is changed as follows : Delete throughout this manual all references to "Theater Army Replacement and Training Command (TARTC)" and substitute therefor: Theater Army Replacement System (TARS). Substitute throughout this manual TALOG for "TALogComd." 1. Purpose and Scope ******* c. (Superseded) Users of this manual are encouraged to submit recommended changes or comments to improve the manual. Com- ments should be keyed to the specific page, paragraph, and line of the text in which the change is recommended. Reasons should be pro- vided for each comment to insure understanding and complete evalua- tion. Comments should be forwarded direct to the Commandant, U.S. Army Command and General Staff College, Fort Leavenworth, Kans. 9. Counterintelligence Counterintelligence is inseparable from the intelligence operations. For this reason, * * * Counterintelligence activities include— 10. Specialized Categories of Intelligence * * * * * * * /. (Added) Terrain intelligence which is processed information on the military significant natural and manmade characteristics of an area. See FM 30-10. g. (Added) Weather intelligence, which is weather information interpreted in relation to its effects upon personnel, equipment and material, and the area of operations. For example, data concerning temperature and wind is weather information ; when interpreted in terms of wind chill and operational implications of this wind chill, the information becomes weather intelligence.
    [Show full text]
  • ATP 2-33.4 Intelligence Analysis
    ATP 2-33.4 Intelligence Analysis JANUARY 2020 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes ATP 2-33.4, dated 18 August 2014. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.army.mil), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard). *ATP 2-33.4 Army Techniques Publication Headquarters No. 2-33.4 Department of the Army Washington, DC, 10 January 2020 Intelligence Analysis Contents Page PREFACE............................................................................................................. vii INTRODUCTION ................................................................................................... xi PART ONE FUNDAMENTALS Chapter 1 UNDERSTANDING INTELLIGENCE ANALYSIS ............................................. 1-1 Intelligence Analysis Overview ........................................................................... 1-1 Conducting Intelligence Analysis ........................................................................ 1-5 Intelligence Analysis and Collection Management ............................................. 1-8 The All-Source Intelligence Architecture and Analysis Across the Echelons ..... 1-9 Intelligence Analysis During Large-Scale Ground Combat Operations ........... 1-11 Intelligence Analysis During the Army’s Other Strategic Roles ........................ 1-13 Chapter 2 THE INTELLIGENCE ANALYSIS PROCESS ..................................................
    [Show full text]
  • Generative Adversarial Networks from a Cyber Intelligence Perspective
    Generative Adversarial Networks from a Cyber Intelligence perspective Fabio BIONDI NATO CCDCOE, Researcher Giuseppe BUONOCORE ITA JCNO, Researcher Richard MATTHEWS RHEM LABS, Researcher Tallinn 2021 About the authors Fabio BIONDI Fabio Biondi is a Lieutenant Colonel (OF-4) in the ITA Air Force, currently on duty at CCD COE Tallinn as researcher and Director of the Operational Cyber Int. Course. He enlisted in the AF in 1988 and from the beginning his specialty was IT. He was a programmer on IBM mainframe platforms and a systems analyst. He was in charge of the Service Desk for the AF for several years, being after that Group CO. Joined the NATO Programming Centre in Glons (BE), becoming Project Manager of the NATO Integrated Command and Control System. Returning to the ITA AF, he was appointed Section Head of NATO C2 Systems in the ITA AF Logistic Command. He took part in the NATO Unified Protector and EU Sophia operations. His last assignment in Italy was in Joint Ops Command as CIS coordinator for the joint exercises of the ITA Armed Forces. He is an advisor for the IHL-International Humanitarian Law, Red Cross certified. He has a Bachelor's degree in Administration and Organisation Science and a master’s degree in Management and Corporate Communication. Married to Paola, has one son, Lorenzo. Giuseppe BUONOCORE Giuseppe Buonocore is a Chief (OR-8) in the ITA Navy, currently on duty at the ITA Joint Command for Network Operations as a cybersecurity expert and researcher in the Cyber Operations Department. After computer science training focused on software design and development, he worked for several years on intelligent combat systems in submarine and cyber warfare.
    [Show full text]
  • The Article Argues That Intelligence Can Learn a Considerable Amount from Social Science Research Inspired by Constructivist and Critical Approaches
    Unlikely Connections: What Can Intelligence Research Learn by Being Critical? The article argues that intelligence can learn a considerable amount from social science research inspired by constructivist and critical approaches. Rather than being polar opposites, intelligence analysis and critical theory can identify significant areas of dialogue. The article begins by analyzing the relationship between research and of intelligence. It discusses the differences between the two and shows that research is a different kind of process than intelligence production, with which it shares some characteristics, but from which it differs considerably. Further, the article argues that research can support intelligence organizations through capacity building, improving the skills of practitioners and offering support to strategic decision-making. Then, it presents three possible understandings of this relationship and argues in favor of the use of critical approaches for improving the performance of intelligence agencies in two ways: understanding the other and understanding oneself. 1. Introduction – comparing intelligence and research The article explores the conceptual and practical interrelationships between intelligence and research. It argues that intelligence analysis can significantly learn from critical research and that the latter can provide resources for improving the former. In order to clear the path for a discussion of the relationship between critical research and intelligence, the paper first claims that research (in general) and intelligence need to be analytically separated, and that all research can offer significant support to intelligence. The article first defines the concepts of research and intelligence and elaborates their main differences. While both processes involve the examination of sources, the testing of previous knowledge and the identification of patterns and culminate in the production of new knowledge, the article argues that they produce a different kind of knowledge.
    [Show full text]
  • MCWP 2-14 Counterintelligence CI Support to the Combat Service Support Element and Rear Area Operations
    MCWP 2-14 Counterintelligence U.S. Marine Corps 5 September 2000 PCN 143 000084 00 To Our Readers Changes: Readers of this publication are encouraged to submit suggestions and changes that will improve it. Recommendations may be sent directly to Commanding General, Marine Corps Combat Development Command, Doctrine Division (C 42), 3300 Russell Road, Suite 318A, Quantico, VA 22134-5021 or by fax to 703-784-2917 (DSN 278-2917) or by E-mail to [email protected]. Recommendations should include the following information: l Location of change Publication number and title Current page number Paragraph number (if applicable) Line number Figure or table number (if applicable) l Nature of change Add, delete Proposed new text, preferably double-spaced and typewritten l Justification and/or source of change Additional copies: A printed copy of this publication may be obtained from Marine Corps Logistics Base, Albany, GA 31704-5001, by following the instructions in MCBul 5600, Marine Corps Doctrinal Publications Status. An electronic copy may be obtained from the Doctrine Division, MCCDC, world wide web home page which is found at the following uni- versal reference locator: http://www.doctrine.usmc.mil. Unless otherwise stated, whenever the masculine gender is used, both men and women are included. DEPARTMENT OF THE NAVY Headquarters United States Marine Corps Washington, D.C. 20380-1775 5 September 2000 FOREWORD Marine Corps Doctrinal Publication (MCDP) 2, Intelligence, and Marine Corps Warfighting Publication (MCWP) 2-1, Intelligence Operations, provide the doctrine and higher order tactics, techniques, and procedures for intelligence operations. MCWP 2-14, Counterintelligence, complements and expands on this information by detailing doctrine, tactics, techniques, and procedures for the conduct of counterintelligence (CI) operations in support of the Marine air- ground task force (MAGTF).
    [Show full text]
  • Intelligence
    FM 2-0 INTELLIGENCE MARCH 2010 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only because it requires protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG 091913Z Mar 04. This determination was made on 12 January 2009. Other requests for this document must be referred to ATTN: ATZS-CDI-D, U.S. Army Intelligence Center of Excellence, Fort Huachuca, AZ 85613-7017, or via e-mail at [email protected]. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document in accordance with AR 380-5. HEADQUARTERS DEPARTMENT OF THE ARMY FOR OFFICIAL USE ONLY This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *FM 2-0 Field Manual Headquarters No. 2-0 Department of the Army Washington, DC, 23 March 2010 INTELLIGENCE Contents Page PREFACE............................................................................................................... v SUMMARY OF CHANGES ................................................................................... vi PART ONE INTELLIGENCE ACROSS THE SPECTRUM OF CONFLICT Chapter 1 INTELLIGENCE AND THE OPERATIONAL ENVIRONMENT ......................... 1-1 The Operational Environment ............................................................................ 1-1 The Intelligence Warfighting Function ................................................................ 1-3
    [Show full text]
  • Defense Intelligence Agency (DIA)
    Description of document: Defense Intelligence Agency (DIA) Department of Defense (DoD) Orders/Charter Establishing the National MASINT (Measurement And Signature Intelligence) Management Office (NMMO), 2008-2009 Requested date: 17-July-2017 Release date: 07-January-2021 Posted date: 15-March-2021 Source of document: Defense Intelligence Agency ATTN: FAC2A1 (FOIA) 7400 Pentagon Washington, DC 20301-7400 Fax: (301) 394-5356 Email: [email protected] The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. DEFENSE INTELLIGENCE AGENCY WASHINGTON, D.C. 20340-5100 FAC-2C January 07, 2021 This responds to your Freedom oflnformation Act (FOIA) request, dated July 11, 2017 that you submitted to the Defense Intelligence Agency (DIA) for information concerning Requesting a copy of the DoD Order or Charter that established the NMMO (National MASINT Management Office).
    [Show full text]