USS Eagle Intel Lab Crypto: Difference between revisions

Jump to navigation Jump to search
updates
(coding)
(updates)
(2 intermediate revisions by the same user not shown)
Line 23: Line 23:


There is a plant on a table in the Office that was a gift from his Grandmother, he has had it now for nine years.  It has a very strong smell of something like Lavender and Eucalyptus  so the office tends to retain that smell.  Mixed with smell of fresh french pressed coffee that Baylen seem to keep going all day.   
There is a plant on a table in the Office that was a gift from his Grandmother, he has had it now for nine years.  It has a very strong smell of something like Lavender and Eucalyptus  so the office tends to retain that smell.  Mixed with smell of fresh french pressed coffee that Baylen seem to keep going all day.   
Baylen uses his Office to read reports, file reports or to communicate in privat, but he tends to use Crypto to do most of his work.  The office can interface with every station in the Crypto with the exception of Cipher, that can only be interfaced with at the terminal itself.  But the processed data can be viewed in the Chief Intel Officers Ready room, along with any station in Crypto.




Line 126: Line 128:


Most intelligence reports are somewhere in the middle; a "B-2" is taken seriously. Sometimes, it is impossible to rate the reliability of source, most commonly from lack of experience with him, so an F-3 could be a reasonably probable report from an unknown source. An extremely trusted source might submit a report that cannot be confirmed or denied, so it would get an "A-6" rating.
Most intelligence reports are somewhere in the middle; a "B-2" is taken seriously. Sometimes, it is impossible to rate the reliability of source, most commonly from lack of experience with him, so an F-3 could be a reasonably probable report from an unknown source. An extremely trusted source might submit a report that cannot be confirmed or denied, so it would get an "A-6" rating.
==Processing==
Refining and analyzing the information.
===Characteristics of Effective Intelligence===
*'''Relevance:''' Do the intelligence products pertain to your mission and support your concept of the operation?
*'''Usability:''' Are the intelligence products in a format you can easily use? Can they pass the "so what?" test? Do they clearly tell you their significance to your concept of the operation?
*'''Timeliness:''' Are you getting the intelligence, targets, electronic warfare (EW) support, and BDA when you ask for them?
*'''Accuracy:''' Are the intelligence products and targets correct? Are targets given with locations sufficiently accurate to attack them?
*'''Completeness:''' Are you getting the whole story or are the portions that are known versus those that are analytical estimates made clear to you?
*'''Objectivity:''' Is the intelligence unbiased, undistorted, and free from political influence or constraint?
*'''Predictive:''' Do the intelligence estimates of enemy capabilities give a set of possible enemy COAs which are prioritized in order of likelihood of occurrence
==Analysis and production==
The data that has been processed is translated into a finished intelligence product, which includes integrating, collating, evaluating, and analyzing all the data.
===Organizing What You Have===
Collection processes provide analysts with assorted kinds of information, some important and some irrelevant, some true and some false (with many shades in between), and some requiring further preprocessing before they can be used in analysis. Raw information reports use a standard code for the presumed reliability of the source and of the information.
{|class=wikitable
!Term
!Definition
!Example
|-
|align=center|Fact
|align=center|Verified information; something known to exist or to have happened.
|align=center|A confirmed inventory of a resource of one's own service
|-
|align=center|Direct Information
|align=center|The content of reports, research, and analytic reflection on an intelligence issue that helps analysts and their consumers evaluate the likelihood that something is factual and thereby reduces uncertainty, Information relating to an intelligence issue under scrutiny the details of which can, as a rule, be considered factual, because of the nature of the source, the source's direct access to the information, and the concrete and readily verifiable character of the contents
|align=center|COMINT or OSINT quoting what a foreign official said; IMINT providing a count of the number of starships at a starbase. HUMINT from a Federation diplomatic officer who directly observed an event.
|-
|align=center|Indirect Information
|align=center|Information relating to an intelligence issue the details of which may or may not be factual, the doubt reflecting some combination of the source's questionable reliability, the source's lack of direct access, and the complex character of the contents
|align=center|HUMINT from a reliable agent, citing secondhand what an informant said that a government official said. OSINT providing a foreign government document that gives the number of starships at a starbase. Indirect OSINT from a Federation embassy officer. COMINT that contains a report by a foreign official to his government, about what something he cannot confirm, but states with a probability.
|-
|align=center|Direct Data
|align=center|Organized information that provides context for evaluating the likelihood that a matter under scrutiny is factual.
|align=center|A chronology of events based on observations by Federation officers
|-
|align=center|Indirect Data
|align=center|Organized information that provides context for evaluating the likelihood that a matter under scrutiny is factual.
|align=center|A chronology based on reports from a liaison intelligence service
|}
Collation describes the process of organizing raw data, interpolating known data, evaluating the value of data, putting in working hypotheses. The simplest approaches often are an excellent start. With due regard for protecting documents and information, a great deal can be done with a few pads, a viewscreen, and a table.
==Categories of counterintelligence==
*'''Collective Counterintelligence:''' Collective counterintelligence refers to gaining information about an opponent’s intelligence collection capabilities that might be aimed at an entity.
*'''Defensive Counterintelligence:''' Defensive counterintelligence involves thwarting efforts by hostile intelligence services to penetrate the service. Defensive counterintelligence starts by looking for places in one's own organization that could easily be exploited by foreign intelligence services. Defensive counterintelligence specifically for intelligence services involves risk assessment of their culture, sources, methods and resources. Risk management must constantly reflect those assessments, since effective intelligence operations are often risk-taking.
*'''Offensive Counterintelligence:''' Offensive counterintelligence can occur after having identified an opponent’s efforts against the system and then trying to manipulate these attacks either by “turning” the opponent’s agents into double agents or by feeding them false information they will report home. This is often called counterespionage - measures taken to detect enemy espionage or physical attacks against friendly intelligence services, prevent damage and information loss, and, where possible, to turn the attempt back against its originator.
The agents of SFI participate in various missions to accomplish their goals.
==Counter-Intelligence==
Counter Intelligence operations involve identifying possible hostile activity and taking preventative action to impede their operations. This could require uncovering long term operatives, taking proactive measures to stop planed operations or in extreme cases require Counter Terrorism teams being employed to resolve any urgent situations.
Counter Intelligence duties within SFI are primarily directed at identifying intelligence activity targeting the Federation. This not only includes operations undertaken by hostile governmental agencies, such as the [[ma:Tal Shiar|Tal Shiar]] and the [[ma:Obsidian Order|Obsidian Order]], but also with threats from independent organizations such as the [[ma:Orion Syndicate|Orion Syndicate]] and the now-defunct [[ma:Maquis|Maquis]].
==Deception & Disinformation==
To divert intelligence-gathering operations away from vital Federation interests, or to disguise ongoing SFI operations, the SFI department may engage in deception and disinformation activity, by way of imparting into the hands of non-Federation parties information which they believe credible. Even non-enemies may be the unknowing target of deception and disinformation, if SFI believes that the ultimate target may be more convinced of such information by proxy.
==Extraction==
Extraction, in the intelligence field, is the act of moving a target from an unfriendly location to a friendly location. Two types of extraction missions exist:
* Extraction of a friendly target. Typically, this involves recovering undercover agents, valuable personnel, or defectors from a hostile location.
* Extraction of an unfriendly target. At times, it may be necessary to obtain key enemy personnel to acquire their technical or strategic knowledge.
==Investigation==
Occasionally, SFI investigates incidents which may have an impact on intelligence. In such cases, agents become involved either in StarFleet or non-aligned agencies.
==Reconnaissance & Surveillance==
As one of the primary activities of SFI, reconnaissance and surveillance are the primary means of learning about non-Federation activities. In such missions, intelligence information is collected in the following methods:
* Researching: simply enough, SFI agents may spend an inordinate amount of time researching via data archives.
* Intercepting transmissions: agents may be required to find ways to intercept communications by way of technological methods, including bugging target locations, amplifying signals sent between two target parties, and so forth. Such transmissions are then sent to HQ for analysis.
==Infiltration==
If necessary, SFI may covertly infiltrate a target organization by way of disguising and inserting agents. Once successfully in place, the operative(s) must complete their assigned mission and withdraw safely.
=='''BLACKNET'''==
BLACKNET is a classified Operator database that can be used by SFI and its direct affiliates to categorize and share information such as BOLO's, VIP lists, Black lists and mission reports, with other members of the intelligence community. Access to this database is striclty monitored, with a classified back-up location.
==Field Operations==
The Field Operations unit governs the deployment and control of Field Operatives or Agents deployed from the Intelligence taskforce.  Agents can be deployed in a number of formats ranging from tactical insertion to the covert placement of a single operative. Length of deployment depends on the source of the Intelligence unit. On the whole, short term operations are deployed from starships while longer term operations, including undercover operations, are deployed from a starbase or similar fixed, defensible position.
In general, Field Operatives are the muscle of the Intelligence Department when needed, yet there is more to the job than that.  Specialties within are wide ranging from 'Human' Intelligence to such tasks as covert surveillance, electronics and demolition.  Other more obvious specialties that fall within the realm of Field Operations would include interrogation and the art of getting into somewhere where you should not be.
==Operations Technology==
Operation Technology (or Op Tech.) officers work to enhance standard equipment, to come up with new solutions to problems and to maintain the Intelligence units equipment ranging from phasers to computers. Beginning in the planning stage of a mission, Op Tech remains involved in planning to determine whether changes to existing equipment is needed or whether custom built specialist equipment is required for the mission to be successful. 
Depending on deployment location, a job can have more mundane duties to perform. Given the type of jobs that need to be performed by Op Tech, the skill base is wide and varied. It should be noted that in all but the largest Intelligence units, Op Tech works on a rather small scale, anything larger than something a normal person can carry would require the assistance engineering.
==Analyst==
The Analyst section is generally regarded as the largest section, although this would depend on the mandate of the Intelligence unit.  The two main sub-unites of the Analyst section are Data and Communication analysts. The jobs of both sub-units are to collect, compile and analyze information from any number of different sources and pass any information of value to the Director. In this capacity, Analysts separate the "signal" from the "noise." When an ongoing mission in underway, Communication Analysts are tasked with keeping the Field Operatives in contact with the ship and to keep the contact hidden while monitoring all on going Communications.
Data Analysts monitor what the Field Operatives are actually doing remotely while providing support information to any problems that the Field Operatives face. The section leaders of both Data and Communication Analyst sections report directly to the Director, who has overall control of the operation. Data Analysts are also tasked with Crypto-analysis, the task of deciphering and analyzing enemy cryptographic codes. 
==Director of Intelligence==
The Director of the Intelligence unit ultimately has to govern when, where, and how the unit operates with relation to the overall mission of the ship or facility that they are on. Strong links with the FO or CO of the parent unit are required, to ensure that the mission of the Intelligence department coincides broadly with the mission of the general StarFleet forces. Other than serving as a liaison, the Director is also required to run the Intelligence unit in the same manner in which a department head runs any other grouping of officers.


{{118Fleet}}
{{118Fleet}}
[[Category:USS Eagle|Intel]]
[[Category:USS Eagle|Intel]]
[[Category:StarBase 118 Intelligence]]
[[Category:StarBase 118 Intelligence]]
3,900

edits

Navigation menu