Intelligence

Intelligence 101

Course Description:

The Intelligence 101 course teaches the basic fundamentals of the intelligence discipline and how information is utilized to achieve operational requirements. Students will learn the key functions of the Intelligence Cycle including Planning, Collection, Processing, Analysis, and Dissemination, as well as how each intelligence discipline (HUMINT, SIGINT, IMINT, OSINT) contributes to All-Source analysis.

Course Duration:

8 hours (1 Day)

Topics Covered:

  • Introduction to Intelligence
  • Intelligence Analysis
  • Intelligence Disciplines
  • The Intelligence Cycle
  • Student Practical Applications

Tactical Network Analysis

Course Description:

The Tactical Network Analysis course focuses on the intelligence methodologies required to create desired tactical effects and achieve specialized operational objectives. Students will learn the components of the Find, Fix, Finish, Exploit, Analyze, and Disseminate (F3EAD) tactical network targeting methodology specifically used by special operation forces (SOF).

Course Duration:

8 hours (1 Day)

Topics Covered:

  • Tactical Analysis
  • Identifying and Building Networks
  • Pattern Analysis
  • Tactical Profile Packages
  • Find, Fix, Finish, Exploit, Analyze, and Disseminate (F3EAD) Cycle
  • Student Practical Applications

Operational Security (OPSEC) and Social Media Awareness

Course Description:

The Operational Security (OPSEC) and Social Media Awareness course teaches students the important security guidelines to protect operational and personal information as well as provides guidance to users of social media sites with regards to protecting personal and professional information. Students will learn how to apply the 5-step OPSEC process of identifying critical information, analyzing the threat, vulnerability analysis, risk assessment, and applying countermeasures.

Course Duration:

8 hours (1 Day)

Topics Covered:

  • OPSEC Terminology
  • Situational Awareness and Protecting Critical Information
  • OPSEC Five Step Process
  • Social Media Safeguarding
  • Student Practical Applications

Open Source Intelligence (OSINT)

Course Description:

The Open Source Intelligence (OSINT) course defines what OSINT is and how its collection, analysis, and production support the larger intelligence picture. Students will understand how the rise of social media and data collection has contributed to an abundance of publicly available information that can be accessed for intelligence gathering. Students will also learn to utilize tools and methodologies that can improve open source collection and research methods.

Course Duration:

8 hours (1 Day)

Topics Covered:

  • The Open Source Environment
  • Ethical Guidance
  • Searching Techniques
  • Source Verification
  • Student Practical Applications

Human Intelligence (HUMINT)

Course Description:

The Human Intelligence (HUMINT) course focuses on how collection of information from human sources is analyzed and processed into intelligence. Students will gain a thorough understanding of the oldest method of intelligence collection and how tactical operators can assist in providing vital information into the intelligence cycle through collection and tactical questioning.

Course Duration:

8 hours (1 Day)

Topics Covered:

  • Introduction to HUMINT
  • Collection Methods
  • Analysis and Production
  • Tactical Questioning
  • Student Practical Applications

Counterintelligence (CI) and Elicitation

Course Description:

The Counterintelligence (CI) and Elicitation course focuses on counterintelligence issues related to information, physical, personnel, and cyber threats to military and law enforcement personnel. Students will learn how to identify various threats from foreign intelligence organizations, extremist organizations, or other criminal elements attempting to gather information. Students will also learn how to identify the characteristics and techniques of elicitation and apply the appropriate countermeasures.

Course Duration:

8 hours (1 Day)

Topics Covered:

  • Targeted Information
  • Espionage and Insider Threats
  • Foreign Intelligence Threats
  • Solicitation and Collection Methods
  • Student Practical Applications

"There is nothing impossible to him, who will try"
- Alexander the Great