Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Lesson Introduction
threat assessments
complete.
~ I P• ge 1of14 I .....
Back Next
ACQlOl Fundam entals of System Acquisitio n Man ag ement
Lesson 19.2 - Intelligence Community ( IC ) RESOURCES I PRINT I HELP
I ntelligence Agency.
Intelligence (DNI).
IC Organizations
The DNJ's role is to organize and coordinate the efforts of the other 16 JC agencies, in order to meet
previously determined intelligence needs . The other members of the JC are divided into three groups :
~
Back
Page 4 of 14
.....
Next
ACQlOl Fundamentals of System Acquisition Management
Lesson 19.2 - Intelligence Community ( IC ) RESOURCES I PRINT I HELP
IC Or gani zations
The DNJ's role is to organize and coordinate the efforts of the other 16 JC agencies, in order to meet
previously determined intelligence needs. The other members of the JC are divided into three groups :
Oetense FBINational
lnl•lg•nc. Sacurly
Program Managers
~
Back
Page 4 of 14
.....
Next
ACQlOl Fundamentals of System Acquisition Management
Lesson 19.2 - Intelligence Community ( IC ) RESOURCES I PRINT I HELP
IC Or ganizations
The DNI's role is to organize and coordinate the efforts of the other 16 I C agencies, in order to meet
previously determined intelligence needs . The other members of the I C are divided into three groups :
~
Back
Page 4 of 14
.....
Next
ACQlOl Fundamentals of System Acquisition Management
Lesson 19.2 - Intelligence Community ( IC ) RESOURCES I PRINT I HELP
IC Or gani zations
The DNJ's role is to organize and coordinate the efforts of the other 16 JC agencies, in order to meet
previously determined intelligence needs. The other members of the JC are divided into three groups :
Oetense FBINational
lnl•lg•nc. Sacurly
~
Back
Page 4 of 14
.....
Next
ACQlOl Fundamentals of System Acquisition Management
Lesson 19.2 - Intelligence Community (IC) RESOURCES I PRINT I HELP
IC Or gani zations
The DNJ's role is to organize and coordinate the efforts of the other 16 JC agencies, in order to meet
previously determined intelligence needs. The other members of the JC are divided into three groups :
PROGRAM MANAGERS
•••••• DEPARTMENTAL
••
••• •••
Did You Know
• • .
. -.
·,
-
; .. '
.
' '
.
.
.
.
"'
.
' .
.. .
-
.
.
.•.
'
-
.
..
- .
' ·'
. .
Each member agency, operates under its own directive, yet, they are all
dedicated to the defense and national security of our nation.
~
Back
Page 4 of 14
Next
.....
ACQlOl Fundamentals of System Acquisition Management
Lesson 19.2 - Intelligence Community (IC) RESOURCES I PRINT I HELP
IC Or ganizations
The DNI's role is to organize and coordinate the efforts of the other 16 JC agencies, in order to meet
previously determined intelligence needs. The other members of the JC are divided into three groups :
Long Description
The 17 IC organizations under supervision of the Office of the Director of National Intelligence.
Program Managers: Central Intelligence Agency, Defense Intelligence Agency, FBI National
Security Branch, National Geospatial Intelligence Agency, National Reconnaissance Office, and the
National Security Agency .
Departmental : DEA Office of National Security Intelligence, Energy Office of Intelligence &
Counter-intelligence, OHS Office of Intelligence & Analysis, Coast Guard Intelligence, State Bureau
of Intelligence & Research, and the Treasury Office of Intelligence & Analysis .
Services : Air Force Intelligence, Army Intelligence, Marine Corps Intelligence, and Naval
Intelligence.
~ Page4ofl4 I ~
Back Next
ACQlOl Fundam entals of System Acquisitio n Man ag ement
Lesson 19.2 - Intelligence Community ( IC ) RESOURCES I PRINT I HELP
IC Oversight
ac tivities.
IC Oversight
activities .
Learn More
Select the link for more information about I C structure and community.
Within DoD, the Defense Intelligence Agency ( DIA ) with its more than 16, 000 military and civilian employees
worldwide, is a major producer and manager of foreign military intelligence . The agency provides military
intelligence to defense policymakers, force planners, and warfighters in DoD and the JC, in support of U.S .
military planning and operations and weapons systems acquisition .
DIA provides Threat Intelligence support to the acquisition process and community to provide an
understanding of foreign threat capabilities that is integral to the development of future U.S . military
systems and platforms . Identifying projected adversarial threat capabilities, to include scientific and
technical developments, which may affect a program or a capability's design or implementation is crucial to
a successful development process .
Furthermore, the applicable threat information must be continually updated to account for adversarial
capabilities throughout the program or capability's projected acquisition lifecycle to ensure that
technological superiority over adversarial capabilities is maintained . DIA operates under DoD Directive
Page6of l 4 ~
Back Next
ACQlOl Fundamentals of System Acquisition Management
Lesson 19.2 - Intelligence Community ( IC ) RESOURCES I PRINT I HELP
The threat intelligence community provides a range of support over the lifecycle of a particular capabili ty
shortfall identification process and the resulting system acquisition program . Capstone Threat
Assessments ( CTAs ) inform the capabili ty shortfall identification process during early phases of system
acquisition prior to the generation of a Validated Online Lifecycle Threat (VOLT) Report, System Threat
Assessment Report ( STAR)/ System Threat Assessment ( STA) . The CTAs project foreign capabilities, in
particular warfare areas, out 20 years .
At the beginning of the Material Solution Analysis ( MSA) phase, the program office or capabili ty sponsor
should contact the appropriate intelligence production center to support integration of validated threat
information into the Acquisition Strategy ( AS ) . Threat information may come from DIA- validated CTA or
other DIA/Service validated (VOLT) STARs/ STAs that align with the capabili ty mission, concept of
IOC
I
O Deve.lo~nt
Decision
coo-~ D~on
Production &
POR CDR Deployment FOC Disposal
cb§V ~ ~>--~~~~~~~~~~~~---...-
The STAR will remain in place as the current threat report until 2016 when the VOLT report will replace it. !!
..._ Page7of l4 I ~
Bac k Next
ACQlOl Fundamentals of System Acquisition Management
Lesson 19.2 - Intelligence Community ( IC ) RESOURCES I PRINT I HELP
The threat intelliqence communi ty orovides a ranae of suooort over the lifecvcle of a oarticular capabili ty
Long Description
The five phase DoD Acquisition lifecycle with timelines illustrating the intelligence analysis requirements .
1. Materiel Solution Analysis ( MSA) - Materiel Development Decision, Initial Capabilities Document ( !CD )
2. Technology Maturation and Risk Reduction - Milestone A, Capability Development Document ( COD ),
Capability Development Document Validation ( CDD- V), Development Request For Proposals Release
Decision ( DRFPRD ), Preliminary Design Review ( PDR)
3. Engineering and Manufacturing Development - Milestone B, Critical Design Review ( CDR), Capability
Production Document ( CPD )
4. Production and Deployment - Milestone C, Low Rate Initial Production ( LRIP ), FRP ( Full Rate
Production ) Decision
5. Operations and Support - Initial Operating Capability ( IOC), Sustainment, Full Operational Capability
( FOC), Disposal
A Capstone Threat Assessment ( CTA) is conducted at the beginning of the Material Solution Analysis
( MSA) phase and remains relevant though the complete lifecycle .
The VOLT/ STAR/STAs are generated after the CTA as early as the MSA Phase and as late as Milestone C.
The Life-cycle Signature Support Plan ( LSSP ) is completed in the first three phases .
The STAR will remain in place as the current threat report until 2016 when the VOLT report will replace it. !!
~ I Page7of14 I .....
Back Next
ACQlOl Fundamentals of System Acquisition Management
Lesson 19.2 - Intelligence Community ( IC ) RESOURCES I PRINT I HELP
CTAs prov ide the bedrock analy tical foundation for threat intelligence support to the defense acquisition
process . CTAs, cov ering major w arfare areas, present the DoD I C v alidated position w ith respect to those
w arfare areas and w ill constitute the primary source of threat intelligence for the preparation of Initial
Threat Environmental Assessments, VOLT/ STARs/ STAs, and threat sections of documents supporting the
Joint Capabilities Integration and Dev elopment Sy stem ( JCIDS ) process .
In order to effectiv ely support both the capabili ty dev elopment and acquisition processes, CTAs are not
specific to existing or projected U.S. sy stems, cov er the current threat env ironment, and, in general,
project threats out 20 y ears from the effectiv e date of the CTA. With the lead intelligence production
center, DIA's Defense Warning Office ( DIA/DWO) co-chairs the Threat Steering Group (TSG ) that produces
and rev iew s the document. CTAs should be updated as determined by the responsible TSG but in any case
ev ery 24 months . DIA v alidates all CTAs.
~ I Page8of 14 I .....
Back Next
ACQlOl Fundam entals of System Acquisitio n Man ag ement
Lesson 19.2 - Intelligence Community ( IC ) RESOURCES I PRINT I HELP
Validated Online lifecvcle Threat (VOLT) Report / Sy stem Threat Assessment (STA )
programs.
years.
DIA will co-chair the TSGs for ACAT ID VOLT Report with the producing command or center. VOLT Reports
for ACAT I C MDAPs and STAs for ACAT II non - MDAPs are prepared and validated by the lead Service in
accordance with service regulations. DIA Instruc tion 5000 .002, Intelligence Threat Suppor t for Maj or
Defense Acquisition Programs, describes the required VOLT Report elements and format.
CIPs are established and examined through the joint and collaborative efforts of the intelligence, capabili ty
sponsor, and acquisition management community to aid in developing intelligence production requirements
to support an acquisition program . CIPs are those key performance thresholds of foreign threat systems,
which, if exceeded, could compromise the mission effectiveness of the U.S. system in development.
Adversary military doctrine, tactics, strategy, and expected employment of systems should be considered
in the CIPs . Program specific CIPs, and their associated production requirements, are a key part of a VOLT
Report and TTRA will be required for validation . The inclusion of CIPs is also encouraged for STAs.
If a CIP is breached, the responsible intelligence production center will notify the program office and
DIA/DWO in accordance with DIA Instruction 5000 .002 . DIA/DWO will notify the appropriate organizations
in the Office of the Secretary of Defense .
~ Page10of 14 I ~
Back Next
ACQlOl Fundam entals of System Acquisitio n Man ag ement
Lesson 19.2 - Intelligence Community ( IC ) RESOURCES I PRINT I HELP
Knowledge Review
Check An sw er
The Cent r a l Int e lligen ce Agency and the Nation al Reconna issance Offi ce are Program
Managers. Other Program Managers include the Defense Intelligence Agency, the FBI National
Security Branch, the National Geospatial-In telligence Agency, and the National Security Agency.
Knowledge Review
~ 2016
2017
LJ 2018
2019
Check An sw er
The STAR will remain in plac e as the current threat report until 2016 when the VOLT report will
replace it.
Lesson Summary
Lesson Completion
To continue, select another lesson from the T able of Cont ents on the lef t.
I f you have closed or hidden the Table of Contents, click the Show T OC