+ All Categories
Home > Documents > Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io...

Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io...

Date post: 03-Jul-2018
Category:
Upload: phungmien
View: 227 times
Download: 0 times
Share this document with a friend
113
National Guard Bureau Joint Intelligence Directorate Intelligence Oversight Policy Analyst CTR GiGi Singleton (703) 607 - 5502 [email protected] Kansas National Guard: CPT Daniel Jones (785) 646 - 3072 [email protected] MSgt Scott Mick (785) 646 - 3084 [email protected] UNCLASSIFIED//FOR OFFICIAL USE ONLY Kansas National Guard Intelligence Oversight Training
Transcript
Page 1: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

National Guard BureauJoint Intelligence Directorate

Intelligence Oversight Policy Analyst

CTR GiGi Singleton (703) 607-5502

[email protected]

Kansas National Guard:CPT Daniel Jones(785) 646-3072

[email protected]

MSgt Scott Mick(785) 646-3084

[email protected]

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Kansas National GuardIntelligence Oversight Training

Page 2: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Purpose‒ To ensure the legality and propriety of all intelligence and

intelligence-related activity• Special emphasis on protecting the Constitutional and privacy rights

of US Persons History

‒ Executive Order 12333• Provides clear guidelines on how to perform intelligence activities

consistent with the legal rights guaranteed to all US Persons by the Constitution

• Gives DoD Intelligence Component the Foreign Intelligence and Counterintelligence Mission

Intelligence Oversight:Purpose and History

Page 3: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

References

Department of Defense (DoD)− DoD Manual 5240.01, Procedures Governing the Conduct of DoD Intelligence Activities, 8

Aug 16− DoD 5240.1-R, Change 1, Procedures Governing the Activities of DoD Intelligence

Components that Affect United States Persons, 8 Aug 16− DoDD 5148.13, Intelligence Oversight, 26 Apr 17

Army − Department of the Army Memo, Implementing Guidance for Intelligence Oversight, 15 Aug

16− Army Regulation (AR) 381-10, US Army Intelligence Activities, 3 May 07

Air Force− Air Force Guidance Memorandum to AFI 14-104, Oversight of Intelligence Activities, 29 Sep

16− Air Force Instruction (AFI) 14-104, Oversight of Intelligence Activities, 5 Nov 14

Chief, National Guard Bureau− CNGB Instruction (CNGBI) 2000.01, National Guard Intelligence Activities, 04 Apr 17− CNGB Manual (CNGBM) 2000.01, National Guard Intelligence Activities, 26 Nov 12− CNGBI 7500.00

State‒ Kansas National Guard SOP 381-10, Intelligence Oversight, 8 Dec 16

NGB IGO reports many ARNG and ANG units are unaware of CNGB Title 32

Intelligence Oversight Policy

Presenter
Presentation Notes
Executive Order 12333 is implemented in the DoD by DoD 5240.1-R. It, in turn, is implemented in the Army by AR 381-10; the Air Force, by AFI 14-104; and the Title 32 National Guard, by CNGBI 2000,01 and it accompanying manual. Most States also have their own Intelligence Oversight Standard Operating Procedures; the Kansas National Guard is no exception. All provide specific rules and procedures governing the COLLECTION, RETENTION and DISSEMINATION of US persons information.
Page 4: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

IO Training Requirements

Title 32 National Guard subject to CNGBI 2000.01‒ Initial Training within 90 days of assignment/employment‒ Refresher Training as part of the routine command training program‒ Tailored to unit mission

Title 10 Army Guardsmen subject to AR 381-10‒ Initial Training within 30 days of assignment/ employment ‒ Refresher Training as part of the routine command training program‒ Tailored to unit mission

Title 10 Air Guardsmen subject to AFI 14-104‒ Initial Training within 60 days of assignment/arrival to unit‒ Annual Refresher Training‒ Pre-deployment if training will expire during

deployment‒ HAF/A2-directed IO Training until standardized training on ADLS

website has been updated or local IO training meeting HA/A2 substitution requirements**

- PEX is NOT mandatory for IO Training and Reporting

ADLS training may be substituted with CNGB-required mission tailored training (pre-approved by HAF/A2 through ANG/A2)so long as (1) all slides in ADLS trainingare covered and (2) a written test is given.

Page 5: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

DoD Procedures

DoDM 5240.01, 8 Aug 16 PROCEDURE 1 General Provisions PROCEDURE 2 Collection of U.S Persons Information (USPI) PROCEDURE 3 Retention of USPI PROCEDURE 4 Dissemination of USPI PROCEDURE 5 Electronic Surveillance PROCEDURE 6 Concealed Monitoring PROCEDURE 7 Physical Searches PROCEDURE 8 Searches of Mail and the Use of Mail Covers PROCEDURE 9 Physical Surveillance PROCEDURE 10 Undisclosed Participation in Organizations

DoD 5240.1-R Change 1, 8 Aug 16 PROCEDURE 11 Contracting for Goods and Services PROCEDURE 12 Provision of Assistance to Law Enforcement Authorities PROCEDURE 13 Experimentation on Human Subjects for Intelligence Purposes

DoDD 5148.13, 26 Apr 17 Identifying, Investigating, and Reporting Questionable Activities and S/HSM

Presenter
Presentation Notes
DoDM 5240.01 and DoD 5240.1-R Change 1 contain 13 procedures that govern intelligence and intelligence-related activity. We will briefly discuss each of them today, with a special emphasis on Procedures 1-4, 12 and DoDD 5148.13 because by regulation, all personnel assigned to intelligence components must be familiar these. DoDD 5148.13 incorporated and eliminated Procedures 14 & 15.
Page 6: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Procedure 1: General Provisions

Applicability of the regulation‒ All personnel assigned to intelligence staffs, units and organizations‒ All personnel conducting intelligence and intelligence-related activities

General principles governing intelligence and intelligence-related activity‒ Conduct all intelligence activity IAW U.S. Constitution, laws, Executive

orders, Presidential directives and applicable policy‒ Do not infringe on US Persons’ Constitutional or privacy rights ‒ Collect, retain, and disseminate information based on a lawfully assigned

mission and function‒ Employ the least intrusive lawful techniques‒ Report all possible violations of federal criminal law by employees

Presenter
Presentation Notes
DoDM 5240.01 and DoD 5240.1-R Change 1 contain 13 procedures that govern intelligence and intelligence-related activity. We will briefly discuss each of them today, with a special emphasis on Procedures 1-4, 12 and DoDD 5148.13 because by regulation, all personnel assigned to intelligence components must be familiar these. DoDD 5148.13 incorporated and eliminated Procedures 14 & 15.
Page 7: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Intelligence Oversight (IO) rules apply to:‒ All personnel assigned to a DoD/National Guard Intelligence

Staff, Unit or Organization (Title 10 and Title 32)• Military personnel, civilians and contractors• MOS/AFSC does not matter

‒ All personnel conducting an intelligence or intelligence-related activity (Title 10 and Title 32)• Military personnel, civilian and contractors• Unit of assignment and MOS/AFSC do not matter

Applicability

Presenter
Presentation Notes
Intelligence Oversight applies to all personnel assigned to a DoD/National Guard intelligence staff, unit or organization regardless of MOS or AFSC, whether they are military, civilian or contractor. Intelligence Oversight also applies to components, to include military personnel, civilians and contractors, as well as all personnel performing an intelligence or intelligence-related function regardless of military specialty (AFSC or MOS). It applies to all personnel with an intelligence MOS or AFSC regardless of assignment.
Page 8: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Non-Intelligence Component

Not Subject to Intelligence Oversight‒ Subject to Protection of Non-DoD Affiliated (NDA) Persons

Information rules• Governed by: DoD Directive 5200.27, Acquisition of Information Concerning

Persons and Organizations Not Affiliated with the Department of Defense

Chief National Guard Bureau Instruction 2400.00, Acquisition of Information Concerning Persons and Organizations Not Affiliated with the Department of Defense

State Active Duty‒ All personnel subject to state law, to include privacy laws‒ Prohibited from using federal Intelligence equipment (e.g.,

UAS, JWICS, and DCGS) without Secretary of Defense approval

Presenter
Presentation Notes
Everyone else in the National Guard, and those in the Counterdrug Program not conducting missions 2 and 5, are not Subject to Intelligence Oversight, but rather are subject to Protection of Non-DoD Affiliated (NDA) Persons Information rules. These rules are governed by DoD Directive 5200.27, Acquisition of Information Concerning Persons and Organizations Not Affiliated with the Department of Defense, which is implemented in the Title 32 National Guard by Chief National Guard Bureau Instruction 2400.00, Acquisition of Information Concerning Persons and Organizations Not Affiliated with the Department of Defense.
Page 9: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Forbidden Activities

Do not investigate U.S. persons or collect or maintain information about them solely for the purpose of monitoring activities protected by the First Amendment or the lawful exercise of other rights secured by the Constitution or laws of the United States

Do not participate in or request any person or entity to undertake any activities that are forbidden by E.O. 12333 or DoDM 5240.01

Do not engage in any intelligence activity, including dissemination to the White House, for the purpose of affecting the U.S. political process

Requesting any other parties perform an act which is forbidden to the intelligence component

Page 10: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Forbidden Activities

Requires hosts to enable audits of access of USPI “to the extent practicable”

Requires participants to inform hosts that their participation complies with all laws and procedures (IO, Privacy and Civil Liberties Protection) applicable to the protection of USPI

Requires components participating in a shared repository to comply with all provisions of the procedures

IAA Application: DAART ‒ NGB requires each participant

acknowledge in writing receipt of Intelligence Oversight training and agreement to comply with all law, policies, and procedures applicable to the protection of USPI before granting access

Page 11: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

What is a US Person?

A US Person is defined as:‒ A US citizen‒ A permanent resident alien in the US‒ A US corporation (except those directed or controlled by

foreign governments)‒ An unincorporated association composed substantially of

US citizens or permanent resident aliens

Presenter
Presentation Notes
We just threw out a lot of terms, so let’s take a few moments to define them. First and foremost, what is a US Person? US persons are defined as US citizens born in the United States, permanent resident aliens in the US, US corporations (except those directed or controlled by foreign governments), and unincorporated associations composed substantially of US citizens or permanent resident aliens.
Page 12: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Assumptions

A person known to be in the US is presumed to be a US Person

A person known to be outside the US is presumed not to be a US Person

A foreign national known to be in the US is presumed not to be a US Person

Presenter
Presentation Notes
National Guard intelligence components may make three assumptions about US persons: - A person known to be in the US is presumed to be a US Person - A foreign national known to be in the US is presumed not to be a US Person - A person known to be outside of the US, is presumed not to be a US Person
Page 13: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Is this a US Person?

Leaders of the Islamic State in Iraq and Syria (ISIS)

Presenter
Presentation Notes
No. Assumed to be foreign nationals.
Page 14: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Is this a US Person?

Homes damaged by tornadoWichita, KS

Presenter
Presentation Notes
Yes. US Persons protections afforded to US Persons’ property.
Page 15: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Is this a US Person?

Chemical Company in Kingsdown, KS

Presenter
Presentation Notes
Yes. US Persons protections afforded to US Persons’ property.
Page 16: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Is this a US Person?

Foreign students at the University of Arizona

Presenter
Presentation Notes
Yes. US Persons protections afforded to US Persons’ property.
Page 17: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Intelligence Activities

Intelligence Activities‒ The collection, processing, analysis and dissemination of foreign

intelligence (FI) and/or counterintelligence (CI) Non-intelligence Activities

‒ Any activities conducted by or with a DoD intelligence component asset or capability that do not involve FI/CI

Intelligence-related Activities‒ Any activities outside the DoD intelligence component that:

respond to operational commanders' tasking for time-sensitive information on foreign entities; respond to nationalintelligence community tasking of systems whose primary mission is support to operating forces; trainpersonnel for intelligence duties; provide an intelligence reserve; or are devoted to research and development of intelligence capabilities.

Page 18: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

National Guard Domestic Operations and Intelligence Oversight

If the National Guard’s domestic mission is a non-intelligence activity, why do IO rules to National Guard domestic operations?− T32 Training Status – leveraging intelligence training for an incidental

operational benefit− Intelligence Training (intelligence-related activity) is subject to IO

rules‒ When SecDef authorizes the use of military intelligence personnel,

equipment and/or activities for non-intelligence purposes, he always includes IO guidance

‒ Therefore, CNGB has applied Intelligence Oversight rules to all National Guard domestic intelligence sets

Presenter
Presentation Notes
If the counterdrug mission is a non-intelligence activity, why do IO rules apply to Missions 2 and 5? When SecDef authorizes the use of military intelligence personnel, equipment and/or activities for non-intelligence purposes, he always includes IO guidance and stipulates the activity will be conducted IAW Intel Oversight rules. Therefore, CNGB has applied Intelligence Oversight rules to all National Guard domestic intelligence sets
Page 19: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

What type of activity?

Intelligence personnel from the Kansas National Guard research threats to brief to Guardsmen traveling to Armenia as part of a State Partnership Program Exchange.

INTELLIGENCE ACTIVITY

Presenter
Presentation Notes
Non-intelligence activity
Page 20: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

What type of activity?

Air National Guard Eagle Vision technicians from the South Carolina National Guard capture imagery and post it to an Eagle Vision portal for the 184th Intelligence Group personnel to use for Incident Awareness and Assessment (IAA) training during a drill weekend.

INTELLIGENCE-RELATED ACTIVITY

Page 21: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

What type of activity?

Kansas Guardsmen assist in search and rescue efforts, power generation, establishment of shelters, distribution of food and water, and debris removal in the wake of an F-5 tornado that almost destroyed the town of Greensburg.

NON-INTELLIGENCE ACTIVITY

Page 22: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Procedure 2: Collection

− Collection occurs one time “upon receipt”− Information must be evaluated “promptly”, but not to exceed 5- or 25-

year retention periods− Four categories of collection: intentional, incidental, voluntarily

provided, special circumstance− May be collected if:

• Mission and Authority• Reasonably Believed to be Necessary• Approved Category of Information• Least Intrusive Means

Presenter
Presentation Notes
Moving on Procedure 2, it specifies the kinds of information about US persons that may be collected, and sets forth the general criteria governing the means used to collect such information.
Page 23: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Sources of Mission and Authority

The Constitution United States Code (e.g., Title 10, Title 32, Title 50) Executive Orders EXORDS and OPORDS Secretary of Defense Memorandums State Plans (e.g., EAP and EMAC) FEMA and Other Primary Agency Mission Assignments

Page 24: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Kansas National Guard Mission

Federal Mission:To provide trained and equipped units to augment the

active Army and Air Force during times of war, national emergency, or Presidential Selected Reserve Call-up.State Mission:

To provide trained and disciplined forces for domestic emergencies or as otherwise provided by state law.

Page 25: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Is it Necessary?

Is the information mission critical? Will failure to disclose the information negatively impact the

intelligence assessment? Will failure to disclose this information create FP

vulnerabilities? Does the information directly support the Commander’s

Critical Information Requirements (CCIRs) and Priority Intelligence Requirements (PIRs)?

Is this information necessary for the Commander’s decision making process?

Will/could this information impact a Course of Action (COA) at a decision point?

Can the information be substituted with the term “USPER” and still achieve the same end result?

Page 26: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Publicly available information Information obtained with consent Information reasonably believed to constitute Foreign intelligence Counterintelligence Threats to safety Protection of intelligence sources, methods and activities Current, former or potential sources of assistance to intelligence activities Persons in contact with sources of potential sources Personnel security Physical security Communications security (COMSEC) investigation Overhead and airborne reconnaissance (not for the

purpose of targeting specific US Persons)**A second category required to collect

Administrative purposes

DoD 5240.1-R Approved Categories of Information

Page 27: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

DoDD 5200.27 Authorized Missions

Protection of DoD functions and property Personnel security Operations related to Civil Disturbance

Weapons of Mass Destruction-Civil Support Teams (WMD-CST) – Congressional authorization

Page 28: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

DoDD 5200.27 Authorized Missions

INTELLIGENCE COMPONENT Publicly available information Information obtained with consent Information reasonably believed to constitute Foreign

intelligence Counterintelligence Threats to safety Protection of intelligence sources and methods Current, former or potential sources of assistance to

intelligence activities Persons in contact with sources of potential sources Physical security Personnel security Communications security(COMSEC) investigation Overhead and airborne reconnaissance (not for the

purpose of targeting specific US Persons)**A second category required to collect

Administrative purposes

NON-INTELLIGENCE COMPONENT‒ Protection of DoD functions and

property‒ Personnel security‒ Operations related to Civil

Disturbance

‒ Weapons of Mass Destruction-Civil Support Teams (WMD-CST) – Congressional authorization

Page 29: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Methods of Collection

Methods of collection should be from the least intrusive means− Collect first from publicly available sources or with US person’s

consent− Collect from cooperating sources− Lawful intelligence collection techniques that do not require a

judicial warrant or approval from U.S. Attorney General− Lawful intelligence collection techniques that require a judicial

warrant or approval from U.S. Attorney General

Limit collection of non-publicly available USPI to “no more information than is reasonably necessary”

Least intrusive Most intrusiveMeans Means

Page 30: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Collect?

In his civilian capacity, a military intelligence NCO works as an intelligence analyst for a large corporation. His duties include reporting on threats to corporate offices in international locations. On a drill weekend, the NCO uses DoD databases to research threats and write a few reports for his civilian job.

No, no mission and authority

Page 31: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Collect?

An NCO in the Military Intelligence Company (MICO) believes his wife is having an affair. He “borrows” her phone and conducts cell phone analysis with unit equipment during a drill weekend to gather evidence.

No, no mission and authority

Page 32: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Collect?

In the wake of severe flooding throughout the State, the Joint Force Headquarters tasks the Civil Air Patrol to stream full motion video to the DCGS-KS. Airmen process and analyze the imagery on unclassified systems, and forward briefings and reports to the Joint Force Headquarters Joint Operation Center, where they are used for situational awareness and to evaluate the effectiveness of Kansas National Guard response efforts.

Yes. NG intelligence component personnel and non-intelligence equipment may be used for IAA to fulfill TAG requirements for situational awareness or planning purposes, or upon receipt of an NG JFHQ-S or NGB-validated primary agency/lead federal agency Request for Assistance (RFA).

Page 33: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

TAG would like more information about members of a local youth gang, who are reportedly painting graffiti on National Guard facilities throughout the State. May J2 personnel research this group and prepare briefings and reports?

No, no mission and authority

Collect?

Page 34: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Procedure 3: Retention

Retention Standard: Promptly evaluate all information that may contain USPI to determine whether it may be permanently retained

Permanent Retention:• Reasonable belief that retention of the USPI is necessary to perform

authorized intelligence mission or function,• Information was lawfully collected or disseminated, AND• One of the following: Information falls within an approved category of information, or Information is necessary to understand or assess FI or CI

Evaluation Period (Temporary Retention):− 5 or 25 years based on the location of the intended target of collection

and type of collection Delete all USPI when:

− Permanent retention standard has not been met OR− A determination concerning retention standard cannot be met within

specified evaluation period

Page 35: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

What information may be retained?

Information collected IAW Procedure 2 or collected incidentally but could have been collected IAW Procedure 2

Information necessary to accomplish assigned mission and function

Page 36: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Access and Retention

Controlled access: limited to need-to-know

Document decisions to permanently retain USPI

All files and documents containing US Persons info must be marked:− ATTENTION: This document contains U.S. persons information, which has been

included consistent with all applicable laws, directives, and policies− The first time a U.S. person appears in a document, the marking “USPER” will precede

the name and/or alias.

Retained files must be reviewed annually; all unnecessary information will be destroyed − Letter of certification

Does NOT apply when information is retained for administrative purposes or is required by law to be maintained

Annual training for employees who access USPI Database queries:

− Establish written procedures for queries− Queries must be relevant and tailored

Periodically audit information systems

Page 37: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Access and Retention

Page 38: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Retain?

Mary Evans234-56-7890

Joe Smith123-45-6789

John Cole345-67-8901

Evelyn Johns456-78-9012

Vay Ri Wong356-78-9012

Doug Small978-90-1234

Presenter
Presentation Notes
What about these files? Yes, if for administrative persons. If not administrative information, yes, if mission, authority, necessity and lawful collection. If not, no!
Page 39: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Retain?

Iran: Internet Attacks on U.S. Banks

China: Cyber Attacks against DoD Contractors

China: Cyber Attacks against U.S. Military Computers

Middle East Cyber Attacks on U.S.

Al Qaeda Cyber Capabilities

North Korea: Cyber Warfare Capabilities

Presenter
Presentation Notes
What about these files? Yes, if for administrative persons. If not administrative information, yes, if mission, authority, necessity and lawful collection. If not, no!
Page 40: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Retain?

Cimarron Bridge,13 Mi E of Liberal, KS

Wesley Medical Center,Wichita, KS

Stormont Vail,Topeka, KSRainbow Bridge,

Baxter Springs, KS

Presenter
Presentation Notes
What about these files? Yes, if for administrative persons. If not administrative information, yes, if mission, authority, necessity and lawful collection. If not, no!
Page 41: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Procedure 4: Dissemination

Information must have been properly collected or retained under Procedures 2 or 3

May only be disseminated by intelligence component employees who have received training on this procedure

Information must fall into one or more approved dissemination categories, and meet dissemination criteria and rules

Page 42: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Dissemination Categories

Page 43: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Dissemination Categories

Page 44: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Dissemination Categories

Page 45: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Procedure 12: Provision of Assistance to Law Enforcement Authorities

Describes types of permissible assistance to law enforcement authorities and sets forth procedures for providing this assistance

Intelligence components may cooperate with law enforcement officials− For investigating or preventing

• Clandestine intelligence activities by foreign powers• International narcotics activities• International terrorist activities

− Protecting DoD employees, information, property, and facilities− Preventing, detecting, or investigating other violations of law

Presenter
Presentation Notes
Procedure 12 describes types of permissible assistance to law enforcement authorities and sets forth procedures for providing this assistance.
Page 46: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Permissible Types of Assistance

Incidentally acquired information believed to indicate a violation of federal, state, tribal, or local law

Personnel or specialized equipment and facilities may be provided to federal law enforcement authorities when approved by SecDef through NGB

**No leveraging intelligence training to incidentally benefit law enforcement without SecDef approval**

Presenter
Presentation Notes
Shown here are the types of permissible assistance National Guard intelligence components may provide to law enforcement authorities. They may pass on incidentally acquired information reasonably believed to indicate a violation of federal, state, tribal or local law. NG intelligence component personnel or specialized equipment and facilities may be provided to Federal law enforcement authorities, and, when lives are endangered, to State and local law enforcement authorities, provided such assistance is consistent with DODD 5525.5, has been approved by NGB/J2, and that the NGB/JA concurs with such use. Approval is sought through a Procedure 12 Memorandum.
Page 47: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Provides details validating the legality of providing NG intelligence component’s personnel, specialized equipment, or facilities to LE authorities when they are used to support intelligence functions of those agencies

Electronic Templates of P12 memo are available for download on the NG-J2 Sharepoint webpage:

Procedure 12 Memorandum

https://gkoportal.ng.mil/joint/J2/NG-J2_IO/default.aspx

Presenter
Presentation Notes
The Procedure 12 Memo provides details validating the legality of providing National Guard intelligence component’s personnel, specialized equipment, or facilities to law enforcement authorities when they are used to support intelligence functions of those agencies. JFHQ-S will generate a P12 Memo, as required, and will seek approval through proper channels prior to the execution of a mission. Examples could be a request for assistance to use a linguist, regardless of military occupation or duty code, to assist in a Law Enforcement Agency intelligence analysis element (LEA Intel Activity) or a request for assistance to use a intelligence linguist to assist in a Law Enforcement Agency investigation. (LEA Non-Intel Activity)
Page 48: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

DHS requests DoD provide approximately 1,200 National Guard personnel in support of civil law enforcement activities along the Southwest Border...

Example: Southwest Border Mission

Presenter
Presentation Notes
Let’s walk through a real-world example of a request for intelligence support: the Southwest Border Mission. The Department of Homeland Security sent an official request to the DoD to provide approximately 1,200 National Guard personnel in support of civil law enforcement activities along the Southwest Border.
Page 49: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Example: Southwest Border Mission

I approve the use of up to 1,200 National Guard personnel in title 32, U.S.C., section 502(f) status...to perform command and control, criminal investigative analysis, and Entry Identification Team activities in response to the request for support from the Department of Homeland Security.

Presenter
Presentation Notes
SecDef approved the use of Title 32 National Guard troops.
Page 50: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Example: Southwest Border Mission

Chairman, Joint Chiefs of Staff publishes EXORD authorizing National Guard to support DHS by performing the following intelligence activities:1. ISR/IAA2. Geospatial Support3. Intelligence Analysis4. Linguist translation and interpretation, including document exploitation5. Other intelligence support missions as required within applicable statutes and as requested and approved by SecDef

Presenter
Presentation Notes
The Chairman, Joint Chiefs of Staff published the execution order which clearly defined the type of intelligence support permissible …
Page 51: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Example: Southwest Border Mission

EXORD clearly spells out IO rules. Intelligence Oversight and Law

Enforcement Derived Information (LEDI). The primary agency exercises overall responsibility for the collection, analysis, retention and dissemination of information concerning the operational environment. Military intelligence assets will not engage in intelligence collection activities again US persons, unless the mission of the intelligence organization directs collection on US persons and the law authorizes the collection IAW EO 12333 and DoD 5240.1-R. All collection of information on US persons will be coordinated with the FBI.

Presenter
Presentation Notes
…as well as the intelligence oversight rules.
Page 52: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

DoDD 5148.13 Employee Conduct

National Guard intelligence components must:‒ Conduct intelligence activities IAW all relevant executive

orders, law, regulations, and policies‒ Be familiar with Procedures 1-4, DoDD 5148.13 and any

other procedures employed by the intelligence component‒ Initial and annual training‒ Report questionable intelligence activity (QIA),

significant/highly sensitive (S/HS) matters and federal crimes

Presenter
Presentation Notes
DoDD 5148.13 sets forth the responsibilities of employees of DoD intelligence components to conduct themselves IAW applicable Executive Orders, laws, regulations, instructions and policy. Intelligence component employees must conduct intelligence activities IAW all relevant executive orders, laws, regulations, instructions and other policy; be familiar with Procedures 1-4, DoDD 5148.13 and any other procedures employed by the intelligence component; and report questionable intelligence activities and federal crimes.
Page 53: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Report all immediately through your chain of command or unit IO Monitor to State IG

State IG must report a QIA to NGB IG within five working days

State IG must report S/HS matters upon receipt to NGB IGO

Those who report are protected from retribution or adverse action

Reporting QIA,S/HS Matters and Federal Crimes

Page 54: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

QIA

“Questionable Intelligence Activity” refers to any intelligence or intelligence related activity when there is reason to believe such activity may be unlawful or contrary to an Executive Order, Presidential directive, Intelligence Community Directive, or applicable DoD policy governing that activity

Page 55: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Samples of QIA

Improper collection, retention, or dissemination of US Persons information‒ Incorporating US Persons information into an intelligence product without

determining if identifying the person is appropriate‒ Collecting US persons information for force protection purposes without

determining if the intelligence function related to it is authorized Misrepresentation

‒ Using the status as an intelligence member to gain access for non-mission-related purposes

‒ Claiming to be conducting a highly classified activity or an investigation, for personal gain, unauthorized access, or to impress or intimidate others

Questionable Intelligence Activity constituting a crime‒ Stealing a source’s payments‒ Using intelligence funds for personal gain

Misconduct in the performance of intelligence duties‒ Falsifying investigative reports or personnel security

investigation interviews

Page 56: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

S/HS Matters

“Sensitive/Highly Sensitive Matters” refers to any intelligence or intelligence related activity (regardless of whether the intelligence or intelligence related activity is unlawful or contrary to an E.O., Presidential directive, Intelligence Community directive, or DoDpolicy), or serious criminal activity by intelligence personnel, that could impugn the reputation or integrity of the Intelligence Community, or otherwise call into question the propriety of intelligence matters‒ Includes matters(a) Involving congressional inquiries or investigations,

(b) That may result in adverse media coverage, (c) That may impact on foreign relations or foreign partners, or (d) Related to the unauthorized disclosure of classified or protected information, such as information identifying a sensitive source and method

Page 57: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Federal Crimes

Military Intelligence professionals are required to report:‒ Significant CI activities‒ Criminal cases‒ Instances of espionage ‒ Other possible federal crimes

Ensures senior DoD and DoJ leadership are aware of:‒ Serious federal crimes involving military intelligence

personnel‒ Possible violations of federal law by others that may come

to the attention of intelligence professionals

Page 58: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Identify person(s) committing the alleged QIA, S/HS Matter or federal crime by name, rank or civilian grade; security clearance and access; unit of assignment, employment, attachment or detail; and assigned duties at the time of the activity

State when and where the activity occurred

Describe the activity and how it constitutes a QIA, S/HS Matter, or federal crime (the applicable portion(s) of DoDD 5148.13 and other applicable law or policy should be cited)

Cite any investigative or corrective action taken

Can Use KSNG SOP Appendix H format

Template

Page 59: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

An Kansas National Guard intelligence professional coaches another on how to pass a polygraph.

YES. QIA.

Report?

Page 60: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

An Kansas National Guard military intelligence NCO is arrested for DUI.

No. Not QIA, S/HS matter or federal crime.

Report?

Page 61: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

An Kansas National Guard military intelligence NCO is arrested for DUI after running a barricade at the White House and killing a U.S. Senator.

YES. S/HS Matter

Report?

Page 62: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

A military intelligence NCO accidentally sends Secret-level classified information via NIPRNet.

No. Not QIA, S/HS Matter or federal crime. Report through security and supervisory channels.

Report?

Page 63: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

TAG would like more information on members of a local youth gang, who are reportedly painting graffiti on National Guard facilities throughout the State, so J2 personnel research this group and prepare briefings and reports.

Yes. QIA.

Report?

Page 64: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Your neighbor, a traditional military intelligence Guardsman in your unit, is arrested under 18 U.S.C. §2251- Sexual Exploitation of Children for producing child pornography.

Yes. Federal crime.

Report?

Page 65: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

IO Monitors MUST submit quarterly IO Reports to State J2 State J2 compiles data and submits state quarterly IO

Report to State IG State IG forwards quarterly IO report to NGB-IGO NGB-IGO provides data to the DoD Office of the Senior

Intelligence Oversight Official‒ Annual report to Congress regarding DoD IO activities‒ Quarterly reports to SecDef, DepSecDef, President’s IO

Board, and Director of National Intelligence (DNI)

Quarterly Reporting

Page 66: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

SampleQuarterly Report Template

Presenter
Presentation Notes
Yes.
Page 67: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Intelligence Oversight Process

Page 68: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Information obtained with consent Publicly available information Foreign Intelligence Counterintelligence Potential sources of assistance to intelligence activities Protection of intelligence sources and methods Physical Security Personnel Security Communications Security Narcotics Threats to Safety Overhead Reconnaissance Administrative Information

Approved Categories

Page 69: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Special Collection Techniques Require Additional Approval

Electronic surveillance (Procedure 5) Concealed monitoring (Procedure 6) Physical searches (Procedure 7) Searches of Mail and the Use of Mail Covers (Procedure 8) Physical surveillance (Procedure 9) Undisclosed participation in an organization (Procedure 10) Undisclosed contracting for goods and services for intelligence

purposes (Procedure 11) Domestic Imagery (NGA and DIA guidance) Any other activities that could be perceived by the general

public as a covert surveillance and covert reconnaissance activity (NGB policy)

Presenter
Presentation Notes
The other procedures in DoD 5240.1-R concern special collection techniques, which are not that common in most National Guard units. ALL special collection activities of the National Guard’s intelligence components must be coordinated through the NGB/J2 for approval by CNGB, SecDef and the US Attorney General, even during emergency situations. Special collection activities include: • Electronic and communications surveillance (Procedure 5), • Concealed monitoring (Procedure 6), • Physical searches (Procedure 7), • Examination of US mail (Procedure 8) • Physical surveillance (Procedure 9), • Undisclosed participation in an organization (Procedure 10), • Undisclosed contracting for goods and services for intelligence purposes (Procedure 11), and • Any other activities that could be perceived by the general public as a covert surveillance and covert reconnaissance activity (NGB-Policy).
Page 70: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

ElectronicSurveillance (Procedure 5)

A flash mob is out of control.

‒ May the Governor request, and TAG order, the use of tactical signals intelligence (SIGINT) systems to assist in relaying relevant information about the mob to better prepare the NG and law enforcement by predicting where problems will occur?

Presenter
Presentation Notes
A flash mob is out of control. Can the governor request, and TAG order, the use of tactical signals intelligence (SIGINT) systems to assist in relaying relevant information about the mob to better prepare the NG and law enforcement by predicting where problems will occur? NO!
Page 71: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

May the governor request, and TAG order, National Guard intelligence personnel to attend services and meetings at the mosques and Islamic centers throughout the State, without disclosing their intelligence affiliation, to ascertain if anti-U.S. sentiment exists or terrorist planning is taking place?

Undisclosed Participation(Procedure 10)

Presenter
Presentation Notes
Can the governor request, and TAG order, MI personnel to attend services and meetings at the mosques and Islamic centers throughout the state, without disclosing their MI affiliation, to ascertain if anti-U.S. sentiment exists or terrorist planning is taking place? NO!
Page 72: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Domestic Imagery

Definition: Any new collection or historical imagery or overhead persistent infrared (OPIR) data collected by satellite (national, commercial or tactical) and airborne platforms for intelligence purposes that cover the land areas of the 50 United States, the District of Columbia, and the territories and possessions of the US, to a 12 nautical mile seaward limit of these land areas

NG domestic imagery users must be aware of the legal and policy concerns associated with domestic imagery, particularly of US persons and private property. Individuals may be held personally responsible for any violation of law or inappropriate use of domestic imagery

Page 73: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Legally Valid Requirements

Responses to natural disasters and civilian emergencies CI, FP, and security-related vulnerability assessments Environmental studies Exercise, training, testing or navigational purposes Support to law enforcement

Page 74: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Commercial Satellite Imagery

Higher-level approval not required Must have valid mission and necessity, such as military

training or domestic disaster relief operations Internal Memorandum for Record (MFR) required

‒ Certifies proper use Follow DoDM 5240.01 procedures for US Persons

information

Presenter
Presentation Notes
NG intelligence components may also use domestic open-source or publicly available imagery (e.g., U.S. Geological Survey (USGS) imagery, Google Earth imagery, and Falcon View Imagery). However, an internal memorandum for record (MFR) describing the purpose of the domestic imagery and naming the component official approving the use will be retained on file in all cases. If obtained imagery specifically identifies a US person (e.g., private property), then the rules and procedures contained in DoDM 5240.01, in particular those regarding retention, must be followed. National Guard intelligence components must not give the appearance of collecting, exploiting or disseminating commercial imagery or imagery-associated products for other than approved mission purposes.
Page 75: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

ClassifiedReconnaissance Satellite Imagery

NGA Regulated by NSGM FA 1806,

Domestic Imagery Proper Use Memorandum

(PUM) required Requests for newly acquired

imagery‒ Title 32: through NGB to NGA ‒ Title 10: through active

component to NGA

Presenter
Presentation Notes
The National Geospatial Intelligence Agency promulgates its domestic imagery policy through its “Domestic Imagery” manual. They require an approved Proper Use memorandum be on file prior to any collection. Because the Kansas National Guard does not have any satellites in its toolkit, you will never have to file a PUM for satellite collection. That said, you may have a requirement for newly collected imagery. In a Title 32 status, work these requests through NG-J2; in a Title 10 status, through your gaining Major or Combatant Command. The J2 may see an annual request for a letter of consent for NGA to collect against state-owned military property (for exercises, training and emergency response).
Page 76: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Airborne Platforms

DIA Regulated by Guidance for Domestic Imagery Collection

and the Submission of Proper Use Statements Proper Use Memorandum (PUM) required CNGBI 7500.00 governs use of UAS for NG

Presenter
Presentation Notes
An approved Proper Use Memorandum, or PUM, must be on file before airborne platforms can be tasked to collect domestic imagery. PUMs must be in accordance with Defense Intelligence Agency (DIA) policy and guidance. In Title 32, PUMs are routed through NGB to DIA; in Title 10, through the active duty component. In the event of an emergency or crisis where US Northern Command (NORTHCOM) is designated lead DoD Operational Authority, all related requests for domestic imagery from airborne platforms must be coordinated with USNORTHCOM to ensure compliance with proper use provisions.
Page 77: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

National Guard Airborne ImageryCollection Policy

May collect imagery during formal and continuation training missions as long as the collected imagery is not for the purpose of obtaining information about specific US persons or private property without consent‒ May incidentally include US persons or private property without

consent May not conduct nonconsensual surveillance on specifically

identified US persons, unless expressly approved by the Secretary of Defense, consistent with US law and regulations‒ Civil law enforcement agency will control any such data collected

Tracking will only be conducted on approved vehicles in which the owner/operator has given consent to the unit to conduct the tracking

Page 78: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

All domestic imagery will contain incidentally collected US Persons information‒ Retain if mission, authority and necessity to do so‒ If not, purge, redact, delete or destroy

Do not post to general access database systems

Retention ofDomestic Imagery

Page 79: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Dissemination ofDomestic Imagery

Only to parties identified in PUM or MFR unless specific, lawful governmental function requirement:‒ DoD employee/contractor requiring imagery for official duties‒ Federal, state or local law enforcement entity if imagery

indicates involvement in illegal activities‒ Intelligence Community agency if imagery is relevant to lawful

function‒ Federal government agency employee if imagery is relevant to

lawful governmental function‒ A foreign government and dissemination is pursuant to an

agreement between governments Includes passing incidentally collected criminal information to

appropriate law enforcement agency Do not post to general access database systems

Page 80: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Is a PUM required?

Page 81: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Immediate Response Authority

Direct, immediate emergencies ‒ To safeguard life, property and public order ‒ To prevent loss of life or wanton destruction

of property and to restore governmental functioning and public order

‒ When unexpected civil disturbances, disaster, calamities or normal governmental functions are unable to control the situation

TAG may authorize domestic imagery collection mission

PUM must be filed as soon as possible during or after mission

** DOES NOT APPLY TO FEDERAL ISR EQUIPMENT AND RPA/UAS– SecDef approval is required**

Presenter
Presentation Notes
We often get questions about authority and life and limb, so let’s talk about it now. TAG, when, in his judgment, the emergency is direct and immediate, and time precludes obtaining prior approval may authorize support activities that include lawful acquisition of US Person’s information when that support is consistent with the Constitution and other laws, regulations and instructions. The JFHQ-State must implement the proper safeguards to protect all information and products collected, acquired, received or used during emergency response and ensure all applicable security regulations and guidelines, and other restrictions will be followed. In such cases, a report will be made immediately to the CNGB through the NGB-JOCC. ** THIS DOES NOT APPLY TO FEDERAL ISR EQUIPMENT, which would require authorization of/approval from SecDef.**
Page 82: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Special Focus Areas

Force Protection vs. Intelligence Intelligence Support and Information Collection during

Domestic Operations Incident Awareness and Assessment (IAA) Use of Unmanned Aircraft Systems (UAS) for Domestic

Operations Joint Intelligence Preparation of the Operational

Environment (JIPOE) The Internet Social Media

Page 83: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Force Protection

A law enforcement responsibility J2 focus is transnational terrorist and opposing military force

threat J2 and J34 must work closely together Intelligence and Force Protection must be handled separately

through their respective channels, but can work together It is not your MOS that is the determining factor but your duty

status.‒ Intelligence personnel can be assigned to the J34 to perform an

FP function!

Page 84: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Intel vs. Force Protection

Monitor foreign threats to NG, DoD, travel

Monitor natural threats

Monitor man-made disasters/accidents

Liaison with other intelligence agencies

Support AT/FP mission

Manage information fusion from all-source

Develop JIPOE/IPE (Joint Intelligence Preparation of the Environment

Assist in developing the overall situational picture/COP

All hazards focus

DoDM 5240.01

DoD 5240.1-R

DoDD 5148.13

Law Enforcement (LE) information

Criminal threat to DoD

Domestic threat to DoD

Liaison with other LE agencies

Criminal threat situational picture

**Must be a direct threat to the National Guard**

DoDD 5200.27

J2Intelligence

J34PM or AT/FP

Page 85: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Intel vs.Force Protection

These functions should work together, but must act independently

Intelligence components have an obligation to pass threat information to:‒ Organization/commander responsible for protecting

threatened persons, facilities or activities (Provost Marshall/ATFP/J34, etc)

‒ Appropriate LE organization

Military IntelligenceFOREIGN THREAT

Governing Regulation:DoD Directive 5240.1R

SecurityDOMESTIC THREAT

Governing Regulation:DoD Directive 5200.27

Cross Talk

Presenter
Presentation Notes
We cannot emphasize enough the importance of cross-talk.
Page 86: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Force Protection Products

When the FP analyst briefs the information, it is an FP assessment briefing, not an intelligence briefing‒ FP products are NOT intelligence products

Presenter
Presentation Notes
When the FP analyst briefs the information, it is an FP assessment briefing – no J2 logos, no presentation as an intelligence briefing, nothing that will give the customer the impression that this is an MI product. It is not your MOS that is the determining factor but your duty status. Intelligence personnel can be assigned to the J34 to perform an FP function FP products are NOT intelligence products!
Page 87: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

DA IG IO Guide on J2, PM and AT/FP Personnel

Department of Army Inspector General “Intelligence Oversight Guide” states:‒ “Unauthorized collection by corps and division intelligence components often

occurs when Force Protection or antiterrorism information is incorrectly included in the intelligence products. Military Intelligence units may be trying to do the Provost Marshal's job. Unless authorized under Chapter 12 (Procedure 12) of AR 381-10, military intelligence components do not have a mission to retain information on U.S. domestic threats; those threats are a law enforcement and Provost Marshal function. The G-2/S-2 is not involved in antiterrorism on the domestic front, which is an operations function as outlined in AR 525-13. This delineation of responsibility does not mean that Military Intelligence components should not pass information of this type to the appropriate authorities; the key point is that intelligence components should not collect, retain, and disseminate this kind of information for Military Intelligence purposes.”

‒ “The Army's Judge Advocate General (TJAG) and Army G-2 have both opined that combining into one person the roles of Intelligence Oversight Officer and the Force Protection Officer is a violation of Army policy because such a combination will likely result in a Procedure 15 violation due to the possibility of co-mingling information and databases.”

Presenter
Presentation Notes
Department of Army Inspector General “Intelligence Oversight Guide” states: “Unauthorized collection by corps and division intelligence components often occurs when Force Protection or antiterrorism information is incorrectly included in the intelligence products. Military Intelligence units may be trying to do the Provost Marshal's job. Unless authorized under Chapter 12 (Procedure 12) of AR 381-10, military intelligence components do not have a mission to retain information on U.S. domestic threats; those threats are a law enforcement and Provost Marshal function. The G-2/S-2 is not involved in antiterrorism on the domestic front, which is an operations function as outlined in AR 525-13. This delineation of responsibility does not mean that Military Intelligence components should not pass information of this type to the appropriate authorities; the key point is that intelligence components should not collect, retain, and disseminate this kind of information for Military Intelligence purposes.” “The Army's Judge Advocate General (TJAG) and Army G-2 have both opined that combining into one person the roles of Intelligence Oversight Officer and the Force Protection Officer is a violation of Army policy because such a combination will likely result in a Procedure 15 violation due to the possibility of co-mingling information and databases.” Note: Procedure 15 superseded by DoDD 5148.13.
Page 88: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Highly discouraged In very rare circumstances when personnel

are not available, it is permissible Consolidated databases and files are not

permitted A clear separation between intelligence, J34

and force protection channels must be maintained

Dual-hatting of J2, PM and AT/FP Personnel

Presenter
Presentation Notes
Dual-Hatting Intelligence, Anti-Terrorism/Force Protection and/or Provost Marshal Personnel. In very rare circumstances when personnel are not available, it is permissible to dual-hat intelligence and AT/FP or provost marshal personnel. However, given the propensity for IO violations and the risk of potential questionable intelligence activities related to US persons information, this practice is highly discouraged. Consolidated databases and files are not permitted. A clear separation between intelligence and force protection channels must be maintained.
Page 89: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Intelligence Support During Domestic Operations

NG intelligence component personnel and Federal intelligence equipment may provide support ‒ When requested by a primary agency, and ‒ Approved by SecDef, or directed by the President

NG intelligence component personnel and non-Federal intelligence equipment ‒ May be used for IAA to fulfill TAG’s requirement for situational awareness and

planning purposes, or ‒ May be used upon receipt of a JFHQ-State- or NGB-validated primary

agency/lead federal agency Request for Assistance. NG intelligence component may provide support for Search and Rescue

(SAR) missions‒ Non-intelligence equipment‒ At request of local, tribal, state or the Air Force Rescue Coordination Center ‒ Implied consent‒ All US Persons information purged at end of mission

Presenter
Presentation Notes
NG intelligence components may provide support to local, tribal, state, and federal civilian authorities, to include support to LE, civil disturbance support, restoration of order, and support requests for National Special Security Events (NSSEs) (e.g., political conventions and major sporting events), actual or potential natural or man-made disasters or catastrophic incidents (including pandemics, hurricanes, floods, and earthquakes; and terrorist attacks or large-scale industrial accidents), or other emergencies, when requested by a primary agency and approved by SecDef or his designee, or as directed by the President. NG intelligence component personnel and equipment can be used for IAA to fulfill TAG’s requirement for situational awareness or planning purposes, or upon receipt of a NG JFHQ-State- or NGB-validated primary agency/lead federal agency Request for Assistance (RFA). The agency must be operating within its lawful function and authority, such as at the request of the Governor’s Office, the primary or lead federal, state or tribal agency for the event, an Emergency Management Assistance Compact (EMAC) request, or a Mission Assignment (MA) from FEMA. At the request of local, tribal, state or the Air Force Rescue Coordination Center (AFRCC), NG intelligence units may provide support for Search and Rescue (SAR) missions. US persons information may be collected during SAR missions under the implied consent rules of Procedure 2. Once the SAR mission is over, all US persons information will be purged. A PUM may not be used as an excuse to delay action when life and limb are at stake; SAR missions may be flown without a PUM. Follow up with a PUM as soon as possible afterward.
Page 90: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Information Collection During Domestic Operations

INTELLIGENCE COMPONENT‒ Foreign criminal, terrorist or

military threats‒ All-hazards threats (natural and

manmade disasters and incidents)

‒ Lines of Communication (LOC) analysis

‒ Movements and geographical locations of large crowds (not specific U.S. Persons)

‒ Erection of street barriers‒ Geographical location of large-

scale destruction of property (e.g., arson and looting)

‒ Effects of weather and terrain on planning and operations

NON-INTELLIGENCE COMPONENT‒ Domestic criminal threat

(foreign and U.S. person)‒ Domestic terrorist threat

(foreign and U.S. person)

Page 91: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Incident Awareness and Assessment

Domestic imagery rules always apply to the collection, retention and dissemination of domestic imagery

DSCA EXORD ‒ Expedites Title 10 IAA Support‒ Pre-approved IAA mission sets: situational awareness, SAR,

damage assessment, evacuation monitoring, CBRNE, hydrographic survey and dynamic ground coordination teams• Other use of IAA assets requires approval of SecDef or his/her

designee

Page 92: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Incident Awareness and Assessment Analytical Analysis

Analysis of imagery, geospatial data, and information collected from cameras, video, electronic optics, IR and Forward-Looking Infrared Radar (FLIR), and the dissemination of final products based on that analysis.

Analysis of information collected from government agencies operating within their lawful functions and authorities.

Analysis of baseline imagery for operational planning (e.g., to determine probable landfall and post-landfall damage and to assess the severity of damage from hurricanes).

Page 93: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Any use of federal ISR equipment for other than Federal mission (or training for that Federal mission) requires SecDef authorization/approval

DoD DSCA Policy (DoDD 3025.18)‒ Any use of UAS for DSCA requires SecDef authorization/approval‒ Use of armed UAS for DSCA operations is not authorized

Deputy Secretary of Defense (Dep SecDef) Domestic Use of UAS policy:‒ Governors may consider the use of UAS for state disaster response

• Requires SecDef approval• Request cannot be delegated

‒ Also requires SecDef approval for any use beyond “go-to-war” training and exercises• 90 days staffing (NGB, Joint Staff and OSD) for training and

routine training and exercises• Quickly in emergencies

‒ No immediate response• Search and Rescue (SAR) exception

Must also follow CNGBI 7500.00, 13 Oct 16

Use of UAS forDomestic Operations

Page 94: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Imagery collected during domestic operations may be provided/shared with other DoD entities (to include NGB) and civil authorities (to include state authorities) as required based on validated need.

Civil authorities are authorized to disclose/show or release selected Unclassified-For Official Use Only (FOUO) imagery products to participating or affected private citizens when the disclosure/release would prevent injury or loss of life and/or facilitate disaster mitigation and recovery efforts.

Specific imagery products may be released to the US media during senior official press conferences to provide visual depiction of disaster area status and disaster response activities.

Dissemination of Imagery Collected during Incident Awareness and Assessment

Page 95: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Joint Intelligence Preparation of the Operational Environment

Purpose: to prepare and assist the commander in gaining situational awareness

IO Rules apply‒ Limit collection to information needed to accomplish

mission‒ Least intrusive means‒ Redact unnecessary U.S. Persons information

Page 96: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

The Internet

IO Rules apply‒ Intelligence personnel must

have an official mission before collecting, retaining, or disseminating even publicly available US persons information posted on the Internet.

‒ Certain Internet-based activities are restricted by the rules requiring disclosure of an individual's intelligence organization affiliation.

Applies to information on NIPRNet, SIPRNet and JWICS

1 • Mission and authority?

2 • Necessary?

3 • Approved Category of Information?

Information obtained with consentPublicly available information

Foreign IntelligenceCounterintelligence

Potential sources of assistance to intelligence activities

Protection of intelligence sources and methods Physical Security

Personnel Security Communications Security

Narcotics Threats to Safety

Overhead Reconnaissance Administrative Information

Page 97: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Internet Considerations

IP, URL and email addresses not obviously associated with a US person may be acquired/retained/processed by intelligence components without determining US person association so long as the component does not engage in analysis focused upon specific addresses

Once such analysis is initiated, the intelligence component must make a reasonable and diligent inquiry to determine whether the data is associated with a US person

Page 98: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Social Networking

IO rules apply‒ Mission and Authority?‒ Necessity?‒ Approved category of information

• Publicly available information

Organizational, not personal, account must be used‒ J3 may report on the domestic and criminal threat‒ J2 may report on the all-hazards and foreign threats‒ PAO may use social media to assess and report on the

public sentiment, both to develop strategic communications and to maintain conversancy with public media trends and directions

Page 99: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

IO Triumvirate

INTELIO program proponent.

Establishes and executesthe program. Provides

Training.IGProvides oversight of all

Military Intelligence activities within the command they serve.

IO quarterly/annual reports.QIA, S/HS Matter and

Federal Crime Reporting

JAGProvides legal advice on

the IO Program.

Page 100: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Command emphasis Identified responsibilities and standards IO Monitor and Alternate appointed in writing Initial and Annual IO Training

‒ Conducted within established timelines‒ Tailored to organization’s mission‒ Training records maintained for five years

IO Continuity Binder On-time by-law reporting

‒ QIA, S/HS Matters and Federal Crimes‒ Quarterly Reports

Active part of all operational planning and execution Active J2, JA and IG involvement

Characteristics of anEffective IO Program

Page 101: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

ARNG and ANG units are unaware of T32 Intelligence Oversight Policy‒ CNGBI/M 2000.01

Units are not satisfactorily documenting initial and annual IO training‒ Must account for all personnel who require training‒ Five-year maintenance requirement

Units are not conducting and documenting annual file review‒ Ensures no unauthorized U.S. Persons information is being

retained Units have not adequately tailored training to their specific

mission ANG units are well-versed on their T10 mission, but lack

awareness of their State mission

NGB IGO IO Inspection Trends

Page 102: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Quiz: 8 Questions

Page 103: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Question #1

Following the shooting of a robbery suspect by a Topeka police officer, peaceful protests are occurring throughout the city. Looting and violent unrest are also occurring in the vicinity of the shooting. TAG wants the Kansas National Guard to be best postured in case the Governor requests support. What information may the J2 provide? The J34?

Page 104: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Question #1

J3/G3/A3 may report on the domestic and criminal threat

J2/G2/A2 may report on the all-hazards and foreign threat

PAO may report on optics and public opinion

Page 105: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

You receive a BOLO report concerning a former Kansas National Guardsman dishonorably discharged for misconduct who is threatening to kill any and all soldiers and airmen. The report contains U.S. Persons information. May you share the report with your soldiers and/or airmen? May you conduct research on the individual?

Absolutely! It is a threat to safety, so the report may be disseminated for their safety and awareness. However, Intelligence professionals may NOT conduct research on the individual nor retain the report.

Question #2

Page 106: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

A lot of information concerning storm damage throughout the state may be obtained through the use of social media. Given US Persons information concerns, may the J2 access Facebook, Twitter or other social media sites for situational awareness purposes?

‒ IO rules apply‒ Use organizational, not private, accounts

Question #3

Page 107: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

A JTF Commander would like to monitor traffic flow on ingress/ egress routes. May the J2 access real-time, live feed of local streets through the use of publicly available traffic camera feed on the Internet?

Domestic imagery rules apply:‒ Not for the purpose of intentionally targeting specific US Persons‒ Include in Annual Internal Memo for Record for the use of Domestic

Imagery and Other Geospatial Information Sources Template : NIPRNet link to NG-J2 PUM webpage:

https://gkoportal.ng.mil/joint/J2/NG-J2_IO/PUMs/default.aspx

Question #4

Page 108: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Question #5

May the J2 research homegrown violent extremists in the state, and provide reports and briefings on the persons and groups and their activities?

J2 may collect only if there is a foreign connection J34 may collect only if they pose a threat to the National

Guard or DoD

Page 109: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Question #6

Kansas National Guardsmen are working crowd control duties at the State Fair and notice suspicious activity taking place. May the Guardsmen use their personal or government cell phones to record, monitor or report the situation?

No. The Guardsmen do not have mission or authority to conduct this type of surveillance or reconnaissance.

Page 110: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Question #7

Intelligence and non-intelligence personnel are working in the Joint Operations Center to provide a Common Operating Picture/situational awareness for TAG and senior leaders during an incident. May the Guardsmen receive, read, and report on threat data received from local, State and Federal law enforcement agencies?

Page 111: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Question #7

All intelligence and non-intelligence personnel may receive and read any information at any time from any source, to include local, State and Federal law enforcement agency information‒ Both parties will determine if they have mission and

authority to use and report on the threat information• J3 personnel may if is a threat to DoD/National Guard • people, facilities, equipment or mission, in this case National• Guard support an incident in the State• Intelligence personnel may report if there is a

foreign/all-hazards nexus (not specific US Person information absent a foreign connection)

Page 112: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

Question #8

Intelligence personnel working in the Joint Operations Center receive information that is marked FOR OFFICIAL USE ONLY-Law Enforcement Sensitive (U//FOUO-LES). May they post it to the Kansas National Guard’s unclassified Papal Visit SharePoint site?

No. U//FOUO-LES information is controlled by the LEA and:‒ May not be posted on a website or

unclassified network‒ May not be disseminated further without LEA

consent

Page 113: Kansas National Guard Intelligence Oversight Trainingkansastag.gov/advhtml_upload/files/ks 2017 io training.pdfReferences Department of Defense (DoD) − DoD Manual 5240.01, Procedures

National Guard BureauJoint Intelligence Directorate

Intelligence Oversight Policy Analyst

CTR GiGi Singleton (703) 607-5502

[email protected]

Kansas National Guard:CPT Daniel Jones(785) 646-3072

[email protected]

MSgt Scott Mick(785) 646-3084

[email protected]

UNCLASSIFIED//FOR OFFICIAL USE ONLY

QUESTIONS?


Recommended