Intelligence Supportability Analysis (ISA)

advertisement
Air Force Life Cycle Management Center
Standard Process
For
Intelligence Supportability Analysis (ISA)
Process Owner: AFLCMC/IN
Date: 1 February 2015
Version: 1.2
Version
1.0
Effective Date
18 October 2013
1.1
1.2
6 November 2013
1 February 2015
Record of Changes
Summary
Standard process reviewed by S&P Board on 19 Sep 2013.
Requested revisions were made and process was sent out
to S&P Board members. Final approval granted at S&P
Board on 17 Oct 2013.
Added minor clarifications to SIPO, Para 4.1
Modified section 5 (Measurement) to better capture
meaningful data/metrics for the IN. Approved in S&P
Board on 19 Mar 2015.
i
Intelligence Supportability Analysis (ISA) Process
1.0 Description
1.1 Intelligence Supportability Analysis (ISA) is the process by which USAF
intelligence, acquisition, and operations analysts identify, document and plan for
requirements and supporting intelligence infrastructure necessary to successfully
acquire and employ USAF capabilities, thereby ensuring intelligence supportability.
The ISA results provide stakeholders with needed info to compare a capability’s
stated or derived intelligence (data and infrastructure) support requirements with the
intelligence support capabilities expected throughout a capability’s lifecycle.
1.2 ISA outputs are the identification of derived intelligence requirements (DIRs) and
deficiencies, along with associated impacts risk to both acquisition and operational
capability if the required intelligence is not provided. Through ISA, stakeholders
identify, document, and plan for derived requirements and supporting intelligence
infrastructure necessary to successfully acquire and field Air Force capabilities.
1.3 All ISA process elements can be tailored to best support each unique acquisition
effort and the Air Force. The outcome of ISA is documented in an Intelligence Health
Assessment (IHA) memorandum for record (MFR) and/or briefing, as well as within
programmatic documents such as the Intelligence Appendix to the Information
Support Plan (ISP), Lifecycle Mission Data Plan (LMDP), Acquisition Strategy,
Systems Engineering Plan (SEP), or solely as a DIR, COLISEUM Production
Requirement (PR), or other appropriate authoritative documents. This compilation of
documentation results in an ISA Packet (ISAP) stored in GLADIATOR. The IHA, an
authoritative document for purposes of recording the results of ISA, is created by an
intelligence support working group, and approved by the supporting intelligence
division senior intelligence officer, or the Director of Intelligence, AFLCMC/IN.
Ensuring ISA is part of programmatic documents is critical to solving intelligencerelated issues and concerns discovered during the analytic process.
2.0
Purpose
2.1 Intelligence integration in support of USAF and Joint systems development has never
been more important or challenging than it is in today’s environment. When
intelligence is not fully integrated into the acquisition lifecycle processes, the results
often include scheduling delays, costly work-arounds, and unplanned adjustments to
operations & maintenance and pre-planned product improvements (P3I). As future
systems become more intelligence-dependent, it is imperative intelligence
requirements are integrated as early as possible to avoid prohibitive costs.
2.2 The desired effect of the intelligence function as a whole is to provide qualitative and
quantitative improvements in survivability, performance, and capability and to reduce
acquisition time and cost.
2.3 The ISA process provides the following elements necessary to effectively integrate
intelligence into the efforts acquisition life cyle process:
2.3.1
A common understanding of efforts intelligence needs across the intelligence,
operations, and acquisition communities.
1
3.0
2.3.2
A working familiarity of intelligence infrastructure and threat analysis among
acquisition/operational authority’s products or customer-funded alternatives.
2.3.3
Integration of the intelligence community stakeholders into planning,
programming, and decision activities to weigh costs/benefits/tradeoffs.
2.3.4
An ability to analyze and compare a variety of intelligence requirements and
deficiencies across numerous efforts to be able to recommend and advocate
prioritized, efficient solutions at reasonable cost.
Entry/Exit Criteria and Inputs/Outputs
3.1 Entry Criteria (can be one or the other, or both)
3.1.1
Work effort is determined intel sensitive by an Intelligence Sensitivity Survey
(ISS).
3.1.2
Program manager requests support in identifying intelligence supportability
needs.
3.2 Exit Criteria
3.2.1
An effort’s intelligence needs are documented, shortfalls addressed,
resolutions planned for, or mitigation plans developed and agreed upon by all
stakeholders.
3.2.2
If there is a significant change in the effort that affects ISA, the effort will
return to the ISS process.
3.2.3
If threat environment significantly changes and that affects ISA, the effort will
return to the ISS process.
3.2.4
Effort is terminated or retired by USAF.
3.3 Inputs
3.3.1
Workload master list (WML) and division-level portfolios.
3.3.2
Initial capabilities document (ICD), capability development document (CDD),
capability production document (CPD), 1067, analysis of alternatives (AoA),
transition support plan (TSP), staffing actions with regard to programs.
3.3.3
Operational plan (OPLAN), concept of operations (CONOPS), acquisition
strategy panel (ASP), capabilities-based assessment (CBA), studies,
DOTMLPF studies.
3.3.4
Analysis, joint capabilities technology demonstration (JCTD), JUON, joint
emergent operational needs (JEON), QRCs, and roadmaps.
3.3.5
ISS documentation, ISD, ISS checklist long form and intelligence sensitivity
tier matrix.
3.3.6
Derived Intelligence Requirements (DIRs), Production Requirements (PRs),
Critical Intelligence Parameters (CIPs), and Request for Information (RFI),
intelligence infrastructure results, and DOTMLPF results.
2
3.4 Outputs
4.0
3.4.1
Listing and documenting all DIRs (including potential deficiencies) to support
program objectives and identify any unique program requirements (document
results of requirements analysis into applicable format. This may include
MFR, TEMP, BBP, Intel Appendix to ISP, RAWs, etc).
3.4.2
Listing of Intelligence Mission Data (IMD) elements required to support
program objectives and identification of any IMD gaps (IMD elements will be
used to develop a LMDP and/or incorporate IMD into program documents,
ICD, CDD, SEP, Acquisition Strategy, etc).
3.4.3
List of foreign threat capability requirements (e.g. threat roadmap, EWIR,
STAR/STAs, local generated Threat Assessments, etc).
3.4.4
Intelligence information and/or infrastructure needs to meet program lifecycle
requirements are identified and documented.
3.4.5
Provision and/or method for long-term intel support established.
3.4.6
Risk assessment to the effort if DIR deficiency is not satisfied (Program Risk
Matrix - IHA) (AFLCMC/IN Decision Point).
3.4.7
Associated intelligence supportability cost estimate to satisfy individual DIRs,
and/or provide input to program office lifecycle cost estimate.
Process Workflow and Activities:
4.1 Suppliers, Inputs, Process, Outputs & Customer (SIPOC), Table 1.
Table 1. SIPOC
Suppliers
PM or project leads.
Intelligence Divisions provide
acquisition intelligence analysts
(AIA). Intelligence Divisions //
SIO // Intelligence Community
PM or project leads //
Intelligence Community
Inputs
Process
Program/initiative
documentation
Conduct
Requirements
Analysis
Program/initiative
Conduct Risk
documentation, DIRs,
Assessment and
ISA; Intel data needed to
Identify
meet program
Deficiencies
requirements
Outputs
Customers
Intel data needs to
meet program
PM / PEO
requirements
Action plan to
resolve DIRs
PM / PEO
PM or project leads
Action plan to resolve
DIRs
Resolve
Deficiencies
Provide data to
PM
PM
PM or project leads.
Intelligence Divisions provide
acquisition intelligence analysts
(AIA). Intelligence Divisions //
SIO // Intelligence Community
All data from all
processes
Combine all data
into ISA packet
ISAP
PM
3
4.2 Process flowchart. The process flowchart below, Figure 1, represents the ISA process.
4
Figure 1. ISA Process
Flowchart
Cost Estimator
(21 IS)
Acquisition Intelligence
Senior Intelligence Officer Program Manager
Analyst
ISA Process Flowchart
Integrate Intel
Requirements
, Identify
Deficiencies
& Mitigate
Risk Program
Unique (1.9)
Receive Intel
Sensitivity
Determination
MFR
Receive Intel
Sensitivity
Determination
MFR
Advocate to IC/
Acq/OPS
Community to
Solve DIRs (1.8)
Review ISS/
Intelligence
Sensitivity Tier
Matrix and Plan
ISA (1.1 & 1.2)
Conduct
Requirements
Analysis (1.3)
Develop a
Risk
Assessment
(1.4)
Develop Action
Plan for
Deficiency
Resolution
(1.5)
Integrate Intel
Requirements
, Identify
Deficiencies
& Mitigate
Risk -Cross
Program
(1.9)
Implement
action plan to
resolve DIRs
(1.6)
Combine all ISA
data into "ISA
Packet" (1.10)
Document
(White paper, ISR
Cert, IHA, etc.)
ISA Complete
If there is a
significant
change in the
program
proceed to ISS
process
If threat
environment
changes
proceed to ISS
process
Estimate costs
associated with
identified DIRs
(1.7)
5
4.3 Work Breakdown Structure (WBS). The below WBS, Table 2, provides additional
detail for the activity boxes in the above flowchart. The MS Excel version of this
WBS with more detail is at Attachment 1.
Table 2. ISA WBS
Lvl WBS
Activity Name
1 1.0
Intelligence
Supportability Analysis
(ISA)
2 1.1
Review Intelligence
Sensitivity Survey
(ISS)/Intelligence
Sensitivity Tier Matrix
2 1.2
Plan ISA
2 1.3
Conduct Requirements
Analysis of efforts intel
data requirements
PM and AIA establish
schedule for
requirements analysis
meetings and PM/SIO
will provide oversight.
PM and AIA conduct
requirements analysis
meetings
3 1.3.1
3 1.3.2
3 1.3.3
3 1.3.4
3 1.3.5
3 1.3.6
Activity Description
This applies to all phases of acq lifecycle (pre-MS A to post- MS C)
Acquisition Intelligence Analyst (AIA) will review ISS long form, Intelligence Sensitivity
SIO and PM
Tier Matrix, and Intelligence Sensitivity Determination (ISD). The ISS associated checklist
items should be reviewed with the program office to determine specific requirements.
The ISD should be reviewed and updated as needed at each MS or major program change.
(e.g. Developmental Planning kick-off, AF Form 1067, etc.)
Determine top-level estimate of resources needed to conduct ISA. PM, working with the SIO
SIO/Intel Division, develops an estimate for the scope of work needed for ISA. Determine
program top-level ISA deliverables and deliverable dates; intelligence data requirements
and program skill set requirements as identified in the ISS long form checklist.
Duration
(Duty Days)
Varies by
program
and/or
initiative
5 days
5 days
Review program requirements and determine intel data needs to support program. (PM
and AIA will review requirements throughout lifecycle of program)
SIO and PM
30 days (Total
1.3 400 days)
PO, Operational MAJCOM and AIA will develop a tailored plan for Intel Support Working
Group (ISWG), Threat Steering Group (TSG), Threat Working Group (TWG) and Technical
Exchange Meetings (TEMs), as required. OPRs should provide oversight and provide a
representative to co-chair working groups. Schedule(s) should coincide with other
scheduled PO meetings to maximize efficiencies and TDY travel costs.
The following are the requirements analysis meetings: Intel Support Working Group
(ISWG), Threat Steering Group (TSG), Threat Working Groups (TWG) and Technical
Exchange Meetings (TEMs). The PM is responsible for bringing together functional
representatives from throughout the program vendor(s), MAJCOM and others in the
intelligence and acquisition communities to ensure all intelligence considerations for the
developing system or capability are addressed. AIA may use the Requirements Analysis
Workbook (RAWs) checklists. The ISWG should use the RAWs checklists to clarify
questions marked yes in the ISD. The AIA may utilize additional and/or other tools to
conduct Requirements Analysis such as Enclosure C to CJCSI 3312.01B.
PM /SIO/
Operational
MAJCOM
10 days
Determine intel Mission Identify and determine IMD (included but not limited to) : Signature data, Electronic
Data (IMD)
Warfare Integrated Reprogramming (EWIR), Order of Battle, Foreign Systems Capabilities
& Performance data, and GEOINT. (Determine if PM requires a stand alone LMDP or
identify IMD in JCIDs documents):
Identify and document Requirements Working Groups will research and establish DIRs, Priority Intelligence
derived intelligence
Requirements (PIRs) and doctrine, organization, training, materiel, leadership and
requirements (DIRs)
education, personnel and facilities (DOTMLPF) requirements and document all program
related intelligence requirements to a common AFLCMC/IN repository. Additionally, these
requirements should be incorporated into relevant program and JCIDs documentation (i.e.
Technology Readiness Development Document (TRD), Life-cycle Mission Data Plan
(LMDP), Information Support Plan (ISP), ICD/CDD/CPD, etc.
Verify whether current WGs will research current intelligence capabilities to satisfy DIRs (IC websites/databases,
data capabilities satisfy industry, academia, etc.)
DIRs.
Submit DIRs into
AIA will submit requirements into applicable databases
databases
4 1.3.6.1 Submit DIRs into AFMC
centralized database
OPR
Program
Manager
(PM)
PM
180 days or as
required and
defined in
subtask 1.3.1
(Review
throughout
each phase of
acq lifecycle
(pre-MS A to
post- MS C)
PM
60 days
PM and/or
SIO
45 Days
PM and/or
SIO
15 days
PM and/or
SIO
10 days (Total
1.3.6 - 55
days)
5 days
AIA will submit threat data (Non-COLISEUM) into AFLCMC/IN and/or AFMC/A2 centralized PM and/or
database, Virtual Threat Portal, Centralized SharePoint, etc.) as applicable.
SIO
6
Lvl WBS
Activity Name
Activity Description
4 1.3.6.2 Draft and coordinate and
AIA will ensure COLISEUM submissions have timely suspense to support PM's schedule by
then submit unsatisfied DIRs working with product centers' ability to meet suspense. Submit STAR/STA PRs and CIPs into
as Production Requirements COLISEUM; support Threat Steering Group (TSG) and STAR/STA reviews.
(PRs) and Critical
Intelligence Parameters
(CIPs) into COLISEUM
1.3.6.3 Submit unsatisfied DIRs to
(NGA and NSA) via MFR
4 1.3.6.4 Submit program specific
threat RFIs into AFMC
centralized database as
applicable.
4 1.3.6.5 Submit Intelligence
infrastructure and DOTMLPF
gaps and shortfalls (DIRs)
into current AFMC DIR
database
3 1.3.7 Tracking and documentation
of DIRs
2 1.4
Develop a Risk Assessment
2 1.5
Develop Action Plan for
Deficiency Resolution
2 1.6
Implement action plan to
resolve DIRs and document
2 1.7
Estimate costs associated
with identified DIRs
2 1.8
Advocate to IC/Acq/OPS
Community to Solve DIRs
2 1.9
Integrate Intel
Requirements, Identify
Deficiences, and Mitigate
Risk
2 1.10
2 1.11
OPR
PM and/or
SIO
Duration
(Duty Days)
15 days
Some Intelligence Communities do not utilize COLISEUM for DIRs; in this situation, the AIA
will submit a MFR through A2 Functional Chain. NGA: AFMC/A2 will follow NGA's method of
submitting requirements; NSA: AFMC/A2 will coordinate with SIGINT Collection Manager to
leverage off of existing NSA Intelligence Needs (IN) or to create and submit a new IN
PM and/or
SIO
15 days
AIA will submit threat data (Non-COLISEUM) into AFLCMC/IN and/or AFMC/A2 centralized
database, Virtual Threat Portal, Centralized SharePoint, etc.) as applicable.
PM and/or
SIO
5 days
AIA will submit DIRs into an AFLCMC/IN and/or AFMC/A2 centralized database. 21 IS conducts PM and/or
cross-program analysis (CPA) across all intel divisions and submit to higher headquarters for SIO
resolution.
5 days
PM and AIA will track DIRs [PRs, Infrastructure & DOTMLPF] and deficiencies that affect cost,
schedule and performance and will record results of WGs by MFR. Tracking DIRs is continuous
process.
After a DIR is assessed as a deficiency, the next step is to determine the risk to the effort if
the deficiency is not satisfied. Program/system stakeholders of the effort need to understand
the impact of not satisfying the deficiency in order to make resource prioritization decisions.
Additionally, the IC needs to understand the impact so they can prioritize their support based
on customer needs. Risk is analyzed from cost, performance, and schedule perspectives over
the lifecycle of the program/system. Depending on the risk, Acqusition and Operations
stakeholders may decide to assume the risk, employ more resources to reduce the risk,
employ a different tactic or product design, or find another way to mitigate the risk. (quantify
the impact to the performance and operational effectiveness of the capability of
missing/degraded intelligence)
An action plan can include determining who to advocate to in order to satisfy the shortfall,
budgeting or reallocating resources, holding TEMs with potential shortfall suppliers to
determine a CoA, working with other organizations to resolve the shortfall, etc. The proposed
strategy to satisfy the shortfall needs to be developed and documented in the applicable ISA
repository.
Depending on the action plan, implementation documentation may include producing a
white
paper, advocacy briefing, ISR-CART input, IHA, intelligence support shortfall (in the impacted
effort’s CDD/CPD Paragraph 9), ISP (Issues' section or, if necessary, Intelligence Appendix),
and/or other programmatic products (such as a Test and Evaluation Master Plan (TEMP), ASP
briefing, etc) type of document.
PM and/or
SIO
5 days
PM and/or
SIO
5 days
PM and/or
SIO
5 Days
PM and/or
AIA
5 days
AFLCMC 21 Intelligence Squadron cost estimators, in coordination with PM and SPC/IPC will
support and/or develop cost estimates of intelligence supportability requirements, for
inclusion in PM life cycle cost estimate; IMD and related PCPED costs will be determined by
the IMD producer (DIA, NASIC, etc.)
Once an action plan is developed, agreed upon by OPRs and documented, support the PO and
Operational MAJCOM to inform the applicable intelligence, acquisition, test, and operational
communities’ leadership and obtain approval on the resolution plan.; support the PO,
Operational MAJCOM and other mitigation OPR/OCR/POCs to implement the action plans.
PM and/or
SIO, 21 IS
costers, AIA,
SPC/IPC
PM and/or
SIO
120 Days
PM and SIO
5 days
PM and/or
SIO
5 days
PM, SIO
and/or AIA
Continuous
Once a resolution is agreed upon to satisfy the shortfall, the decision needs to be acted on by
the program manager if the shortfall is unique to the program. If the shortfall falls within
several programs then the SIO will coordinate with the 21 IS for cross program anaylisis. In
this situation, the program managers/leadership need to be informed of the plans and kept
apprised of the status.
Combine all ISA data into
Once all ISA steps have been attempted/completed, AIA will compile all ISA data (ISS, ISD,
"ISA Packet"
DIR, CIP, PR, DOTMLP-F, IHA, memos, schedules, meeting minutes, PSR reviews,etc.) and
place in AFLCMC/IN and/or AFMC/A2 centralized database
Continuously monitor threat Assigned / applicable intel support orgs stay involved in program/system activity, as
environment and program
authorized by PO and/or Operational MAJCOM. Intel support orgs continue to review the
activity
foreign threat environment, key program documentation deadlines and status of program
intelligence deficiencies, providing updates to stakeholders as required and resourced. If
significant modification/upgrade to program, must go back to the ISS WBS.
10 days
7
4.4 Work Guidance Package
5.0
4.4.1
Acquisition Intelligence Guidebook
https://org.eis.afmc.af.mil/sites/FOWRALC/ING/AIS/Forms/AllItems.aspx
4.4.2
AFLCMC/IN Toolset
https://intelshare.intelink.sgov.gov/sites/acqintel/ (SIPRNet)
Process measurement
5.1 Process Results: The goal is to have all (100%) of Intelligence Sensitive programs
complete the ISA process, including having the ISAP posted in GLADIATOR.
5.1.1
This is a phased, multi-year effort. All ACAT programs nominally have at
least 4 updates to the ISAP accomplished before milestone C (Pre-AoA,
before milestones A, B, C). Furthermore, in the operations and sustainment
(A&S) phase, additional updates to the ISAP occur through the remaining
lifecycle.
5.2 Process Evaluation
5.2.1
6.0
Data will be collected and displayed on the IN Standardized Process
Dashboard located on GLADIATOR on SIPRNET. The dashboard contains
the ISA status of: the program; the outcome of the required
JCIDS/programmatic documentation (CDD inputs, LMDP, IHA, IMD, etc.);
and the ISAP documents posted in GLADIATOR.
Roles and Responsibilities
6.1 Process Owner AFLCMC/IN.
6.1.1
Maintains and coordinates any changes to this process.
6.1.2
Leads and/or assigns personnel to work on any process improvement.
6.1.3
Secures approval for changes to this process with the Standards and Process
Board.
6.2 Program Executive Officer (PEO)
6.2.1
Acknowledge the intelligence sensitivity of assigned programs, as determined
by the Director of Intelligence.
6.2.2
Ensure Program Managers request sufficient acquisition intelligence and
Special Security Officer support throughout the lifecycle of intelligence
sensitivity programs.
6.2.3
Ensure intelligence-related metrics are incorporated into intelligence sensitive
portfolio efforts.
6.3 Program Managers (PMs).
6.3.1
Ensure local intelligence division receives full notification of any capability
changes to efforts which will affect intelligence sensitivity.
6.3.2
Provides programs/initiative reference material for review.
8
6.3.3
Provides additional documents for review when there are non-concurrences
with SIOs.
6.3.4
Partner with local intelligence division support with ISA for their
programs/initiative.
6.3.5
Requests Center SIO assistance in conducting ISA and to lead the effort to
document and resolve deficiencies.
6.4 Senior Intelligence Officers (SIOs).
6.4.1
Review ISD/Intelligence Sensitivity Tier Matrix and plan ISA
6.4.2
Maintain oversight of AIAs within their intelligence division during ISA
process for all programs
6.4.3
Advocate to the Intelligence Community, Acquisition and Operational
Communities to assist in solving program/initiatives DIRs
6.5 Acquisition Intelligence Analyst (AIAs).
7.0
6.5.1
Review ISS/Intelligence Sensitivity Tier Matrix and plan ISA.
6.5.2
Conduct requirements analysis
6.5.3
Submit PRs and Input DIRs into AFLCMC/IN and/or AFMC/A2 centralized
database
6.5.4
Develop a risk matrix (Intelligence Health Assessment)
6.5.5
Develop an action plan for deficiency resolution in coordination with PM.
6.5.6
Implement the action plan to resolve DIRs and document (white paper, ISR
certification, IHA, etc).
6.5.7
Combine all ISA data into an ISAP
6.5.8
If there is a significant threat environment change, AIA will return to the ISS
process to determine possible change in level of intelligence sensitivity, and if
required, restart ISA process to ensure all intelligence needs are identified,
documented and worked.
Tools.
7.1 SharePoint (SIPRNet): https://intelshare.intelink.sgov.gov/sites/acqintel/
8.0 Training.
8.1 HAF/A2 Acquisition IFTU (Mandatory for SIOs and AIAs) and associated MTTs.
8.2 AFLCMC/IN MTT (Mandatory for SIOs and AIAs)
8.3 REQ 111 – Capabilities Based Requirement Course:
http://www.dau.mil/pubsca%20ts/Pages/risk_management.aspx
8.4 Office of Aerospace Studies – AoA Training:
https://centernet.hanscom.af.mil/acqdev/PMTB/AoA/AoA.htm
9
8.5 AFIT Developmental Test and Evaluation (SYS 229) http://www.epublishing.af.mil/shared/media/epubs/AFI14-111.pdf
8.6 AFIT Center for Systems Engineering:
http://www.dtic.mil/whs/directives/corres/pdf/500002p.pdf
8.7 SYS 031 Course site is currently down (Mandatory for SIOs and AIAs)
8.8 ACQ 101 http://icatalog.dau.mil/onlinecatalog/courses.aspx?crs_id=2 (Mandatory for
SIOs and AIAs)
8.9 SYS 101 http://icatalog.dau.mil/onlinecatalog/courses.aspx?crs_id=2 (Mandatory for
SIOs and AIAs)
8.10 RQM 110 http://icatalog.dau.mil/onlinecatalog/courses.aspx?crs_id=2
(Mandatory for SIOs and AIAs)
9.0 Definitions, Guiding Principles and/or Ground Rules & Assumptions
9.1 Definitions
Acquisition Intelligence Analyst (AIA): Intelligence personnel who provide
acquisition intelligence support to intelligence sensitive AFMC managed programs
and systems. This support is provided to programs and systems throughout the
lifecycle.
Cross Program Analysis: CPA involves an analytical effort designed to “look across”
all intelligence-sensitive efforts and the related intelligence deficiencies. The purpose
of CPA is to identify common requirements and achieve synergies within resulting
common solutions. Synergies between efforts and cost savings are realized when
solutions are identified that support multiple programs/systems. An additional aspect
of CPA is to identify system or program integration issues. In addition, linkage of
documented requirements with multiple customer sets serves to strengthen AF
requirements forwarded to the larger Intelligence Community for action. (AFI 14111).
Intelligence Community (IC): The federation of executive branch agencies and
organizations that conduct foreign and/or counter-intelligence activities necessary for
conduct of foreign relations and protection of national security. IC members include
the Service intelligence organizations (NGIC, ONI, NASIC, MCIA, and Service
intelligence staff/support units), NSA, CIA, FBI, DIA (including MSIC and AFMIC),
NRO, and NGA, as well as the intelligence components of the US Coast Guard,
Department of Energy, Department of Homeland Security, Department of State,
Department of Commerce, and Department of Treasury.
Intelligence Sensitive: Efforts that require intelligence data during development or to
perform their mission, require the direct support of intelligence personnel, or influence
intelligence data at any point in the PCPAD cycle. Any program/initiative that
produces, consumes, processes, or handles intelligence information, thereby requiring
threat or intelligence infrastructure support. If it is likely that, in the future, the
program/initiative would produce, consume, process, or handle intelligence
information, then it should be considered intelligence-sensitive.
10
Intelligence Supportability Analysis: ISA is the process by which AF intelligence
plans for and documents the requirements and supporting intelligence infrastructure
necessary to successfully acquire and employ future Air Force capabilities. ISA should
begin as early as possible and continue during all phases of the acquisition lifecycle
for intelligence sensitive efforts. As a minimum, ISA should identify as specifically
and completely as possible, projected requirements for intelligence products,
information, or services to include required performance, descriptive, or qualitative
attributes.
Intelligence, Surveillance, and Reconnaissance Capabilities, Planning and
Analysis (CP&A): The ISR CP&A outlines how the AF will create ISR capabilities to
meet the demands of today and into the future. It incorporates guidance from the
current AF Strategic Plan, AF ISR Strategy and the AF ISR Operational Concept and
defines how ISR development will progress, including end to end management for ISR
capabilities and weapon systems. The ISR CP&A is a critical input to the GIISR
CFMP and is the foundational process to guide execution of the AF ISR Strategy.
Planning and direction, Collection, Processing and exploitation, Analysis and
production, and Dissemination (PCPAD):
Planning and direction — In intelligence usage, the determination of intelligence
requirements, development of appropriate intelligence architecture, preparation of a
collection plan, and issuance of orders and requests to information collection agencies.
(JP 2-01)
Collection — In intelligence usage, the acquisition of information and the provision
of this information to processing elements. (JP 2-01)
Processing and exploitation — In intelligence usage, the conversion of collected
information into forms suitable to the production of intelligence.
Analysis and production — In intelligence usage, the conversion of processed
information into intelligence through the integration, evaluation, analysis, and
interpretation of all source data and the preparation of intelligence products in support
of known or anticipated user requirements. (JP 2-01)
Dissemination and integration — In intelligence usage, the delivery of intelligence
to users in a suitable form and the application of the intelligence to appropriate
missions, tasks, and functions. (JP 2-01).
Program Manager: Designated individual with responsibility for and authority to
accomplish program objectives for development, production, and sustainment to meet
the user’s operational needs. The PM shall be accountable for credible cost, schedule,
and performance reporting to the Milestone Decision Authority (MDA). (DoDD
5000.1)
Workload Master List (WML): The WML will be a consolidation of information
from various sources designed to provide AFLCMC with the most current and
comprehensive list of programs and other requirement efforts driving resource
allocations and support activities. The WML is currently in development by
AFLCMC/XP as part of an overall strategic planning effort.
11
9.2 Ground Rules and Assumptions
9.2.1
PMs are partnering with AIAs in local SIO’s office for advice and
counsel on how to conduct ISA.
9.2.2
PM, single manager, product director, technology director, team leader, or
initiative lead are working closely with center SIO or their designated
representatives to identify intelligence requirements.
9.3 Acronyms
ACAT
Acquisition Category
AFISRA Air Force Intelligence, Surveillance and Reconnaissance Agency
AFI
Air Force Instruction
AFMC
Air Force Materiel Command
AFLCMC Air Force Life Cycle Management Complex
AFRL
Air Force Research Laboratory
AoA
Analysis of Alternatives
CBA
Capabilities-Based Assessment
CDD
Capability Development Document
CONOPS Concept of Operations
CP&A
Capabilities, Planning and Analysis
CPA
Cross Program Analysis
CPD
Capability Production Document
DOTMLPF Doctrine, Organization, Training, Materiel, Leadership, Personnel,
Facilities
GDIP
General Defense Intelligence Program
IC
Intelligence Community
ICD
Initial Capabilities Document
IPT
Integrated Product Team
IS
Intelligence Squadron
ISA
Intelligence Supportability Analysis
ISAP
Intelligence Supportability Analysis Packet
ISD
Intelligence Sensitive Determination
ISP
Intelligence Sensitivity Prioritization
ISS
Intelligence Sensitivity Survey
ISTM
Intelligence Sensitivity Tier Matrix
JEON
Joint Emergent Operational Need
JCTD
Joint Capability Technology Demonstration
JUON
Joint Urgent Operational Need
MAJCOM Major Command
MWL
Master Workload List
MFR
Memorandum For Record
MIP
Military Intelligence Program
NIP
National Intelligence Program
OPLAN
Operational Plan
ORD
Operational Requirement Plan
PCPAD
Planning and Direction, Collection, Processing and Exploitation, Analysis
and Dissemination
12
PEO
PM
QRC
SIO
TSP
Program Executive Officer
Program Manager
Quick Reaction Capability
Senior Intelligence Officer
Transition Support Plan
10.0 References to Law, Policy, Instructions or Guidance.
AFI 10-601
Operational Capability Requirements Development
AFI 14-111
Intelligence Support to the Acquisition Life-Cycle
AFI 14-111_AFMC Sup 1 Intelligence Support in Force Modernization
AFI 63-101/20-101
Integrated Life Cycle Management
AFI 63-114
Quick Reaction Capability Process
AFI 99-103
Capabilities-Based Test and Evaluation (Chapter 4.11, 5.14)
AFI 99-114
Foreign Materiel Program (on SIPR)
AFPAM 63-128
Guide to Acquisition and Sustainment Life Cycle Management
CJCSI 3170.01H
Joint Capabilities Integration and Development System, 10 Jan 12
CJCSI 3312.01B
Joint Military Intelligence Requirements Certification.
Clinger-Cohen Act Summary: http://www.dtic.mil/dtic/tr/fulltext/u2/a453958.pdf
DAG
Defense Acquisition Guidebook
DoDI 4630.8
Procedures for Interoperability and Supportability of Information
Technology (IT) and National Security Systems (NSS)
DoDI 5000-02
Operation of the Defense Acquisition System
DoDI 5200.39
Critical Program Information Protection Within the DoD
DoDD 5250.01
Management of Intelligence Mission Data (IMD) in DoD Acquisition
<http://www.dtic.mil/whs/directives/corres/pdf/525001p.pdf>
Attachment 1: MS Excel version of WBS
ISA_WBS_MASTER_
24 Sep 13.xlsx
13
Download