IIT’s core capabilities include:
IIT technicians designed, developed, fielded and provide sustainment support for the Armys AGI and MASINT Reporting and Dissemination Service (AMRDS). AMRDS is a web-based, XML compliant automation support tool that facilitates the AGI and MASINT operational support missions at all Army production centers, ARSTRAT, NGIC, NASIC and a growing list of GEOINT producers. Hosted at the 513th MI Brigade on Fort Gordon, Georgia, the service includes requirements tracking, mission management, personnel management, training management, workflow management, analytic report generation and dissemination tools, quality management tools, integrated ArcGIS and ArcSDE map tools, Google Earth servers, and fully integrated target and geospatial databases.
This robust, highly sophisticated and successful service facilitates timely reporting and dissemination of critical, time-sensitive information to DoD customers in a temporally and spatially accurate environment. Particular attention is paid to following industry best-practices and ensuring the information consumer an intuitive and easy to use capability. The capabilities of this service have been recognized by the Army G-2, the offices of the DNI and other national level agencies for the innovation and value-added support it provides the Army and the Intelligence Community at-large.
IIT provides organizations with a cost-effective way to implement and manage information security technologies and practices by employing a combination of 24/7 Intrusion Detection System Monitoring, firewall management, analysis of sensor data, and providing appropriate response and follow-up action. IIT also evaluates and recommends security enhancements for physical systems to reduce risks.
IIT provides a cost-efficient strategy for dealing with network security incidents. IIT has demonstrated expertise in designing Computer Incident Response Facilities and Teams, and can assist in building your team, to include development of technical and procedural policies and provide training resources. IIT also offers remote assistance and on-site incident analysis and recovery services.
IIT offers a comprehensive set of services designed to simulate, plan against, and ultimately survive potentially damaging situations. IIT goes beyond traditional disaster recovery planning to include Business Impact Analysis and take into account the reliance on an IT infrastructure for e-business and e-government operations. The resulting plan includes all critical business functions.
IIT provides a wide range of Geospatial Intelligence support for requirements throughout the Intelligence Community, including support for Joint Commands such as the Joint Interagency Task Force – South and national organizations across DoD like NGA, DIA, the Army, and the Air Force. IIT’s capabilities in both Advanced Geospatial Intelligence (AGI) and Measurement and Signature Intelligence (MASINT) are exceptional. The preponderance of IIT’s current effort is focused specifically on AGI and MASINT support to Army activities ranging from Policy through Product Dissemination. IIT provides program and policy support at Headquarters Department of the Army, AGI and MASINT mission planning and management at the Army Intelligence and Security Command and on-site Requirements Management (RM), Processing, Exploitation and Dissemination (PED), and related training at the AGI/MASINT Regional Nodes (MRNs) supporting US Forces Korea, PACOM, SOUTHCOM, CENTCOM and SOCOM that are hosted at the Army Theater Intelligence Brigades. Additionally, IIT supports the development and presentation of Army specific AGI and MASINT training under INSCOM at Fort Belvoir.
IIT analysts provide full-spectrum Geospatial Intelligence support to the COCOMs, their ground components, and Joint Task Force(s) operating in their respective AORs. IIT personnel supporting the MRNs provide full-spectrum information integration for the Army’s All-Source Analysis element and Theater Ground Intelligence Centers of those warfighting commanders, receiving raw intelligence data from national and theater collection sources as appropriate and available. IIT analysts employ highly sophisticated processing algorithms to perform digital signal processing to extract and exploit unique phenomenology to facilitate reporting in response to stated information requirements from the supported commands/activities.
IIT analysts work directly with the supporting Joint Analysis Centers (JAC), the collection managers and other intelligence analysts within each theater and make recommendations to the collection managers. Absent validated requirements, IIT analysts employ tools such as the Requirements Management System (RMS), the Planning Tool for Resource Integration, Synchronization and Management (PRISM), and the Community On-Line Intelligence System for End-Users and Managers (COLISEUM) and other systems to research and identify potential opportunities develop, coordinate, and staff collection requirements, and exploit resulting data for reportable intelligence information. For MASINT specific collection and processing requirements, IIT analysts routinely generate both standing requirements and amplifications to standing requirements and ADHOC requirements within the MASINT Requirements System (MRS) on behalf of the supported commands. IIT analysts also staff the Army’s only consolidated Unattended Ground Sensor/Unattended MASINT Sensor (UGS/UMS) PED activity to provide direct, time-dominant support to forward deployed DoD organizations engaged in ongoing combat operations.
IIT provides a host of services to protect and defend information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. IIT IA services include, but are not limited to, Threat and Vulnerability Assessments, Risk Analysis and Management, Incident Response and Recovery, and Systems Security Engineering.
IIT provides intelligence analysis for a wide range of operations and security functions, including homeland security, critical infrastructure protection, risk reduction, border security operations, asymmetric warfare activities, combatant commanders, and national intelligence agencies.
IIT delivers tailored training to develop intelligence analysts supporting corporate, state, and local fusion centers. This training provides overviews of key processes and functions that must be incorporated for effective collection, analysis, and production. It encompasses law enforcement intelligence and national intelligence fusion, including legal restrictions and limitations, privacy and personnel security requirements, and key task performance across the intelligence cycle. It provides the basic foundation for analysts developing open source and all source intelligence.
Homeland Security Presidential Directive 7 (HSPD-7) calls for the creation of private sector Information Sharing and Analysis Centers to protect United States critical infrastructures from attack, ninety-five percent of which are privately-owned. On a 24/7 basis, ISACs collect and analyze information pertinent to their industry and focus on those incidents, threats and activities that most affect that industry. ISACs help identify critical infrastructure and the impacts of its loss or degradation. Filtering information from the global information environment by the threats and infrastructure vulnerabilities permits ISAC analysts to focus their efforts and helps the industry to prioritize the application of limited security resources.
• Acquire Relevant Information
• Analyze Threat Indicators
• Monitor and Fuse Intelligence
• Alert and Warn
• Assess Risk
• Build Critical Infrastructure “Target Folders”
• Enhance Cyber Security
• Employ Red Teaming
• Reduce Decision Cycles
IIT currently operates three 24×7 ISACS: the Public Transportation (PT-ISAC), the Over The Road Bus (OTRB-ISAC) and the Surface Transportation (ST-ISAC) ISACs.
Commercial: IIT can assist your organization in addressing the complex requirements of today’s e-Commerce environment. Our team will provide you with the information and tools essential to ensuring compliance with such legal and regulatory statutes as HIPAA and the Gramm-Leach-Bliley Act for financial Services.
Government: IIT can conduct audits or full assessments under DITSCAP or NIACAP. In addition, we advise customers in cost effective methods for complying with GISRA and IAM.
Risk management is the continuous process of selecting, implementing, and monitoring countermeasures to maintain an acceptable level of risk at an acceptable cost. IIT begins the process with an assessment of an organization’s critical assets and the impact of their degradation, their vulnerability to exploitation, and the nature and likelihood of specific threats. This information is used to identify and evaluate risks and develop effective countermeasures to reduce that risk.
IIT provides intelligence, security, and technical support to future organizational and operational actions impacting Army Signals Intelligence (SIGINT) capabilities. Our personnel support the Army Cryptologic Operations (ACO) staff located at the National Security Agency; Fort Meade, MD, and the TROJAN Management Office under the auspices of the INSCOM Deputy Chief of Staff; Operations/G3; and INSCOM Major Subordinate Commands (MSC) in ongoing programs to realign missions, personnel, systems, and other resources to ensure support to the Army, Ground Component Commanders, and the Intelligence Community at large.
IIT routinely participates in multi-service and multi-agency working groups developing the SIGINT and cryptologic plans for the future of national, theater, and tactical intelligence. This includes support to the development of the Army Cryptologic Architecture (ACA) and ensuring service and ground component requirements and equities are captured within the overarching Unified Cryptologic Architecture (UCA). IIT provides support in planning for the implementation of Project FOUNDRY and initiatives to enhance the technical skills and operational capabilities of the tactical force. Additionally, our personnel assist Army’s portion of the cryptologic programs. IIT tracks changes and evaluates impacts from changes in personnel and programs funded under a variety of programs (CCP, DCP, IISP, as well as other GDIP, NFIP and TIARA), including recent implementation/migration to the Military and National Intelligence Programs (MIP-NIP).
In support of on-going TROJAN Management Office Operations, IIT provides analytical and technical personnel to assist in the planning and implementation of TROJAN systems that have evolved from training systems to critical elements in the Army’s Intelligence Strategy. IIT supports the ARMY/INSCOM TROJAN Management Office through systems and operational concept development and review; system security/accreditation; and, coordination and planning of deployments, upgrades and new system fielding.
As a compliment to all of its services, IIT provides its clients with highly qualified, multi-disciplined staff support, to include operational deployment with military forces. IIT personnel have extensive problem solving and intelligence experience. Most with military/government intelligence and special operations backgrounds, which include real world Information Warfare and Information Operations experience.
Through extensive exposure to information technologies ranging from simple access control systems to the most complex incident modeling and logistic support networks, IIT operates an internationally recognized IT security Evaluation and Test laboratory. Services include pre-evaluation consulting, product evaluations based on ISO 15408 Common Criteria Standards, and cryptographic validation and testing to the FIPS 140 standards.
As a part of IIT’s unique focus on managing business and information related risk, IIT works with organizations to examine the threats they face and to analyze their unique vulnerabilities. IIT provides detailed testing of computer networks using commercial and proprietary tools to identify the latest known vulnerabilities, followed by an analysis to confirm that exposures have not been mitigated by other countermeasures or that other vulnerabilities may exist.