🚀 Join Our Team as an SME All Source Targeter! 🚀 DarkStar Intelligence is hiring Subject Matter Expert Targeters at Davis-Monthan AFB to support the 612th Air Operations Center in Strategic Competition, Targeting, Counter Terrorism, and Counter Narcotics. Primary Duties: Research and analyze state and regional threats. Mentor analysts and enhance intelligence capabilities. Use commercial analysis, big data, social media exploitation, and geolocation solutions. Conduct target assessment and network analysis. Provide on-site targeting mentorship. Emphasize PAI and OSINT use. Travel for ISR-related engagements within the USSOUTHCOM AOR. Qualifications: Top Secret/SCI clearance. Bachelor’s degree 8 years experience or 12 years experience. U.S. Passport. Expertise in due diligence, analytics, and intelligence tools. Strong communication and mentoring skills. Knowledge of interagency operations; SOF and counter-narcotics experience desired. Advanced targeting skills and F3EAD methodology. 🔗 Apply now: https://ow.ly/LrUl50SyqO0 #DarkStarIntelligence #IntelligenceJobs #Targeting #DefenseJobs #Hiring #MilitaryCareers #TopSecret
DarkStar Intelligence’s Post
More Relevant Posts
-
Principal Recruiter - #JCITA #counterintelligence #counterintelligenceagent [email protected]
Countersurveillance/Surveillance Detection Instructor TS/SCI Quantico VA #JCITA #NCIS #OSI #counterintelligence #cyberinvestigation #Cyber #DC3 #ARMY #USMC #Quantico #CISAC #35L #AFOSI #CI #agent #offensivesecurity #surveillance #RDA #Collections #investigations #case
To view or add a comment, sign in
-
A DATA ODYSSEY : THE PALANTIR STORY. Chapter 4: Government Contracts. Palantir achieved a significant breakthrough with the successful acquisition of government contracts, marking a pivotal moment in the company's trajectory. 1. CIA and Intelligence Community Partnership: One of Palantir's early triumphs was securing a partnership with the Central Intelligence Agency (CIA). Palantir Gotham, designed for intelligence analysis, proved to be a valuable asset in processing and making sense of vast amounts of data. This partnership laid the foundation for subsequent collaborations within the broader intelligence community. 2. FBI and Counterterrorism Efforts: Palantir's platforms gained prominence in the FBI and other law enforcement agencies, particularly in the context of counterterrorism efforts. The ability to integrate diverse datasets and provide real-time analysis became crucial in identifying patterns, potential threats, and enhancing overall national security. 3. Deployment in Military Operations: Palantir's technologies found applications in military operations, aiding in mission planning, threat assessment, and decision support. The adaptability of Palantir's platforms to diverse operational contexts contributed to their widespread adoption within defense agencies. 4. Success Stories in Government Operations: As Palantir's software demonstrated its effectiveness in real-world scenarios, success stories emerged. Analysts and operatives praised the platforms for their intuitive interfaces, powerful analytical capabilities, and the ability to facilitate collaboration among different agencies. 5. Validation and Expansion: Government contracts provided a stamp of validation for Palantir, establishing its reputation as a trusted partner in the realm of data analytics for national security. With each successful deployment, the company's influence expanded, leading to additional contracts and collaborations with various government entities. 6. Challenges and Criticisms: Despite its successes, Palantir also faced criticisms, particularly concerning issues of privacy, surveillance, and the ethical implications of its involvement in government operations. Navigating these challenges required a delicate balance between addressing concerns and upholding the company's commitment to providing valuable solutions for public safety. The acquisition of government contracts not only solidified Palantir's position in the data analytics industry but also positioned the company as a critical player in the broader landscape of national security and intelligence. Palantir Gotham's role in counterterrorism and intelligence analysis became central to the company's identity, laying the groundwork for its future expansion into both government and commercial sectors. #startup #strategy #data #defenceindustry #artificialintelligence #technology
To view or add a comment, sign in
-
-
At the FBI, we offer a wide range of exciting opportunities, and one such career path is that of intelligence analyst. This role is crucial in analyzing information and tackling varied casework from counterterrorism to organized crime. Within this function, there are five distinct career paths you can explore: 1. Threat Analysis assesses and communicates real-time analytic judgments regarding specific threats and intelligence gaps. 2. Collection Management enhances our intelligence collection capabilities and disseminates raw intelligence against priority collection requirements and intelligence gaps. 3. Domain Analysis consolidates comprehensive information into strategic analytic products that contextualize intelligence and enhance our understanding of threats, gaps, and vulnerabilities. 4. Targeting Analysis shares collected information across teams that identify gaps while ensuring timely and accurate reporting of intelligence. 5. Reports Officer reports raw intelligence in a timely manner through various forms of media, documents, and general information to determine patterns. Forge your path as an intelligence analyst. Learn more today. https://ow.ly/7evq50Q48VU #IntelligenceAnalyst #FBIJobs #FBI #Analyst
To view or add a comment, sign in
-
-
A.D Military Sc.CAS CMAS CRC ASC ATO Project ArmyXXII ,CRPF Intel Project.Gen V K Singh has tabled his plans to create Int Brigade at Corps level.His LinkedIn posts rewrites intel doctrine.Design of a new Warfare system.
A INTELLIGENCE SOLUTION FOR ALL ARMIES.CAN BE APPLIED TO POLICING. THE 5Ds. Operationalizing Ops?? To give a Direction to division and correct alignment of ops to 5 fundamental "direction facilitators of operations".Detect,Deny,Deter,Deliver,Destroy.I will call them Ops Channel as they guide the employment of the particular type of Ops reqd. Beginning from the very first vague perception of threat to the final point of threat spectrum,these 5 Ops Channel points dictate ALL POSSIBLE OPS. Detect: The very first pt on threat spectrum.We apply HUMINT, Reconnaissance and Surveillance,Cordon and Search to detect the Enemy. Deny:We employ Counterintelligence and OPSEC to frustrate enemy info collection,insider threat,security test and CI activities.We also employ armed R&S to deny avenues of approach and create a threat environment to deny enemy movement freedom. Deter: Cordon and Search Ops.Harrasment Ops.Hardening measures.FP Int ops.Tactical HUMINT Ops Deliver: To deliver the local population from Enemy influence.We employ PsyOps,faith building activities,civil assistance programs.Tactical Human Exploitation to seperate pro Govt from Enemy facilitators and sympathizers followed by Prosecution Ops. Destroy: Encirclement,Harrasment,Seek and Destroy,Search and Destroy ( these two diff.Seek is when you have info about threat.Search is you go and look for threat) and other Combat Ops So we have the basic template on which to correctly and coherently plan Ops. PS. With effort,trial and error and iterations Kashmir can be Operationalized using this template of identifying Areas of Ops Channel and suitably applying needed Ops. The 5Ds enable the full and total treatment of any threat. I assume i have appropriately defined the battlespace in terms of 5 threat avenues of collection of int and application of ops From this we can design for example CRPF Cobra Multidimensional Operational Teams Trust me,of ALL my writings till today this comparatively very short writing is the best solution to COIN and Terrorism. It clearly highlights the problem areas in our int collection and ops planning and execution.The 5Ds bring to fore how we lack organized guidance of int collection and ops application.
To view or add a comment, sign in
-
Principal Recruiter - #JCITA #counterintelligence #counterintelligenceagent [email protected]
Counterintelligence Cyber Collections Instructor TS/SCI Quantico VA #JCITA #NCIS #OSI #counterintelligence #cyberinvestigation #Cyber #DC3 #ARMY #USMC #Quantico #CISAC #35L #AFOSI #CI #agent #offensivesecurity #surveillance #RDA #Collections #investigations #Case
Counterintelligence Cyber Collections Instructor (CCDC) job in Quantico, Virginia, United States of America | Training jobs at CACI
careers.caci.com
To view or add a comment, sign in
-
Human intelligence gathering is still a vital part of overall national security intelligence gathering. UMBRA augments HUMINT with advanced collection of threat intelligence, OSINT, precrime surveillance, data security and AI based predictive analytics. UMBRA is #nationalsecurity https://lnkd.in/gx-Bnk3h #nationaldefense #threatintelligence #computersecurity #precrime #terrorism #infrastructure #OSINT #predictiveanalytics #SIGINT #electronicwarfare #suntzu #ai #datasecurity
The Role of Human Intelligence in Today’s World
https://theumbra.com
To view or add a comment, sign in
-
Global | Regional | Inclusive Workplace Safety and Security | Security Management | Pragmatic Measurable Integrated Strategies | Security Risk Management | Access | Organizational Preparedness | Organizational Resilience
Opportunity for change
The National Counterintelligence and Security Center is hiring! Please have a look at this vacancy for our National Counterintelligence Officer for Emerging and Disruptive Technologies. Qualified applicants from outside of the federal government (https://lnkd.in/eKPhsCbe) and within (https://lnkd.in/ex8b8vTS) have a great opportunity to pursue work on the intersection of national security and critical and emerging technologies with a collegial team.
National Counterintelligence Officer for Emerging and Disruptive Technologies (EDT)
usajobs.gov
To view or add a comment, sign in
-
In a world where technology is rapidly advancing and available to the masses, companies and policymakers face a daunting reality—non-state actors are using innovation for sinister purposes. While artificial intelligence (AI) and autonomous systems promise enhanced threat detection, terrorist groups are exploiting these tools for recruitment and attacks. The future is concerning as AI becomes more widespread and autonomous systems and augmented reality redefine society. Source: Strategic Studies Institute and US Army War College Press https://lnkd.in/epWcG6uy #terrorism #terrorists #terror #technology #tech #AI #artificialintelligence #highthreat #threat #threats #tools #recruitment #attack #attacks #violence #nationalsecurity #homelandsecurity #detection #intelligence #intel #cyber #cybersecurity #cyberattack #security #resource #research
To view or add a comment, sign in
-
Ladies and Gentlemen, I had a chance to attend the NYPD Cyber Intelligence and Counterterrorism Conference 2023 at the Convene in New York City this week and what resonated with me is the following: everyone challenges the acquisition and procurement of technology and capability as slow and that vendors do not do a good job of meeting everyone's needs. Also, that technology is moving so rapidly that we as a community are lagging our adversaries and great power competitors. Process is holding up progress. But I believe it is not the acquisition or procurement system that is slowing development of products and getting those products to our warfighters. It is the lack of a requirements community to define the need. If we do not have teams of operators looking at the op mode summary of missions in a detail across all functional capabilities in all services, we are not giving industry what they need to meet that requirement. This is a huge issue in a time when we can ill afford to take the time, but we have to do this detailed work to determine how we will fight and what capabilities will be needed. We can't continue using the easy button of incrementally developing old technologies. We have to tell industry what we want, when we want it, and then put the resources behind the technology to develop and deliver quickly. This process takes leadership. The Manhattan project, the SR-71 Blackbird projects were highly managed and strong leadership cleared the way to get these capabilities to the field quickly. So, I hate to give problems with no solution, so here are a few recommendations: 1) Get a requirements development team with users and leaders and develop reference scenarios for all functional areas that can be continuously improved over time 2) Include industry in discussions after the Government has gotten its act together to cross pollinate technical solutions 3) Develop quickly requirements documents that are phased and give the max flexibility between the threshold and objective (30-60 days) 4) Develop with the acquisition community acquisition strategies that meet user needs (Do not conform to DODI 5000.75 in the IT space that says you do not need these documents, you do) 5) Resource your most critical priorities As a requirements developer, acquisition expert and tester, leadership can make this process work seamlessly. We just need to do it!
To view or add a comment, sign in
-
The Counterterrorism Group (CTG) is joining the Video Intelligence Company Toren AI to hold a webinar on “How video intelligence is transforming security and investigation standards across a wide range of industries.” CTG Alumni Logan Dopp, President of Toren AI, and Adam Smith, Global Security Supervisor at CDW will participate on a panel of experts to discuss this important topic. In this webinar, participants will learn how video intelligence is enhancing security and investigation standards in a multitude of industries. Global security operation center operators, watch officers/standers, and security guards are often assigned a large number of cameras to monitor. Panelists, Logan Dopp of Toren AI, Todd Shewmake of Vision Engineering Development & Operations, Derrick Dortch of IALEIA and Adam Smith of CDW will be discussing how AI is adapting to user behavior to improve detection and analysis with every input, preemptively mitigating risks, and reviewing footage in a fraction of the time it normally takes. Learn how you can always stay one step ahead by identifying potential risks or threats within seconds. #ai #video #security #workflow #surveillance #intelligence #investigation #detection #artificial_intelligence #videointelligence Register: https://lnkd.in/eKvw_BiW
How Video Intelligence is Transforming Security and Investigation Standards
eventbrite.com
To view or add a comment, sign in