Target Analyst Reporter
The Target Analyst Reporter (TAR) provides synthesized products to customers by researching, analyzing, and reporting intelligence via appropriate reporting vehicles in response to customer requirements and IAW missions of SIGINT, cybersecurity, and cyberspace operations. They prioritize, assess, evaluate, and report information obtained from SIGINT collection, cyber surveillance, and reconnaissance operations sources. The TAR enhances reporting with collateral information as required, maintains awareness of internal and external customer requirements, and collaborates with other collectors and analysts to refine collection and reporting requirements. The TAR shares target-related information and provides feedback to customers as appropriate. The TAR develops working aids and provides database updates on target activity to enhance and build target knowledge and improve collection. The TAR performs quality control and product-release functions.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
244 | Ability to determine the validity of technology trend data. |
Ability |
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
915 | Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
Knowledge |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1056 | Knowledge of operations security. |
Knowledge |
2001 | Accurately characterize targets. |
Task |
2081 | Classify documents in accordance with classification guidelines. |
Task |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
Task |
2089 | Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. |
Task |
2101 | Identify and conduct analysis of target communications to identify information essential to support operations. |
Task |
2134 | Conduct target research and analysis. |
Task |
2183 | Coordinate with other organizations to deconflict reporting. |
Task |
2195 | Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology. |
Task |
2236 | Determine if information meets reporting requirements. |
Task |
2243 | Determine what technologies are used by a given target. |
Task |
2356 | Engage customers to understand customers’ intelligence needs and wants. |
Task |
2400 | Examine intercept-related metadata and content with an understanding of targeting significance. |
Task |
2427 | Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.) |
Task |
2429 | Generate requests for information. |
Task |
2434 | Identify threat tactics, and methodologies. |
Task |
2441 | Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
2459A | Identify cyber intelligence gaps and shortfalls. |
Task |
2515 | Initiate requests to guide tasking and assist with collection management. |
Task |
2542 | Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications. |
Task |
2568 | Make recommendations to guide collection in support of customer requirements. |
Task |
2608 | Monitor target networks to provide indications and warning of target communications changes or processing failures. |
Task |
2621 | Provide SME and support to planning/developmental forums and working groups as appropriate. |
Task |
2628A | Provide subject matter expertise to development of exercises. |
Task |
2715 | Produce reports based on intelligence information using appropriate formats for dissemination. |
Task |
2719 | Profile targets and their activities. |
Task |
2770 | Provide time sensitive targeting support. |
Task |
2779 | Review appropriate information sources to determine validity and relevance of information gathered. |
Task |
2781 | Reconstruct networks in diagram or report format. |
Task |
2798 | Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources. |
Task |
2818 | Sanitize and minimize information to protect sources and methods. |
Task |
2840 | Support identification and documentation of collateral effects. |
Task |
2893 | Assess, document, and apply a target’s motivation and/or frame of reference to facilitate analysis, targeting and collection opportunities. |
Task |
2894 | Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination. |
Task |
2897 | Conduct analysis of target communications to identify essential information in support of organization objectives. |
Task |
2902 | Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing. |
Task |
2904 | Identify cyber threat tactics and methodologies. |
Task |
2905 | Identify target communications within the global network. |
Task |
2906 | Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis. |
Task |
2912 | Perform or support technical network analysis and mapping. |
Task |
2919 | Perform social network analysis and document as appropriate. |
Task |
2922 | Tip critical or time-sensitive information to appropriate customers. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3020 | Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information. |
Ability |
3021 | Ability to collaborate effectively with others. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3052 | Ability to identify intelligence gaps. |
Ability |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
Ability |
3074 | Ability to recognize and mitigate deception in reporting and analysis. |
Ability |
3077 | Ability to think critically. |
Ability |
3078 | Knowledge of target methods and procedures. |
Knowledge |
3081 | Ability to utilize multiple intelligence sources across all intelligence disciplines. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3113 | Knowledge of target intelligence gathering and operational preparation techniques and life cycles. |
Knowledge |
3117 | Knowledge of all-source reporting and dissemination procedures. |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3158 | Knowledge of cyber operation objectives, policies, and legalities. |
Knowledge |
3166 | Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies. |
Knowledge |
3172 | Knowledge of collection sources including conventional and non-conventional sources. |
Knowledge |
3174 | Knowledge of the intelligence requirements development and request for information processes. |
Knowledge |
3179 | Knowledge of common networking devices and their configurations. |
Knowledge |
3181 | Knowledge of common reporting databases and tools. |
Knowledge |
3219 | Knowledge of cyber operations. |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3237 | Knowledge of denial and deception techniques. |
Knowledge |
3242 | Knowledge of document classification procedures, policy, resources, and personnel. |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3288 | Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless). |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3296 | Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http). |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3324 | Knowledge of information and collateral intelligence sources. |
Knowledge |
3338 | Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions. |
Knowledge |
3346 | Knowledge of Internet and routing protocols. |
Knowledge |
3382 | Knowledge of methods to integrate and summarize information from any potential sources. |
Knowledge |
3386 | Knowledge of midpoint collection (process, objectives, organization, targets, etc.). |
Knowledge |
3407 | Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3418 | Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors). |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3450 | Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure. |
Knowledge |
3505 | Knowledge of strategies and tools for target research. |
Knowledge |
3534 | Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference. |
Knowledge |
3542 | Knowledge of the basic structure, architecture, and design of converged applications. |
Knowledge |
3564 | Knowledge of the data flow from collection origin to repositories and tools. |
Knowledge |
3582 | Knowledge of the intelligence frameworks, processes, and related systems. |
Knowledge |
3595 | Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements. |
Knowledge |
3603 | Knowledge of the principal methods, procedures, and techniques of gathering information and producing intelligence. |
Knowledge |
3608 | Knowledge of the purpose and contribution of target templates. |
Knowledge |
3616 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3617 | Knowledge of the structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3664 | Skill in identifying how a target communicates. |
Skill |
3667 | Skill in analyzing a target’s communication networks. |
Skill |
3678 | Skill in analyzing traffic to identify network devices. |
Skill |
3689 | Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses). |
Skill |
3692 | Skill in assessing the applicability of available analytical tools to various situations. |
Skill |
3708 | Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis. |
Skill |
3765 | Skill in disseminating items of highest intelligence value in a timely manner. |
Skill |
3771 | Skill in evaluating data sources for relevance, reliability, and objectivity. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3773 | Skill in evaluating information to recognize relevance, priority, etc. |
Skill |
3774 | Skill in evaluating accesses for intelligence value. |
Skill |
3778 | Skill in exploiting/querying organizational and/or partner collection databases. |
Skill |
3787 | Skill in identifying a target’s communications networks. |
Skill |
3797 | Skill in identifying leads for target development. |
Skill |
3803 | Skill in identifying, locating, and tracking targets via geospatial analysis techniques |
Skill |
3812 | Skill in interpreting metadata and content as applied by collection systems. |
Skill |
3822 | Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results. |
Skill |
3828 | Skill in navigating network visualization software. |
Skill |
3863 | Skill in recognizing midpoint opportunities and essential information. |
Skill |
3864 | Skill in recognizing relevance of information. |
Skill |
3865 | Skill in recognizing significant changes in a target’s communication patterns. |
Skill |
3867 | Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information). |
Skill |
3867A | Skill in recognizing technical information that may be used for target development including intelligence development. |
Skill |
3873 | Skill in researching essential information. |
Skill |
3885 | Skill in fusion analysis |
Skill |
3890 | Skill in synthesizing, analyzing, and prioritizing meaning across data sets. |
Skill |
3908 | Skill in using research methods including multiple, different sources to reconstruct a target network. |
Skill |
3915 | Skill in using geospatial data and applying geospatial resources. |
Skill |
3923 | Skill in using non-attributable networks. |
Skill |
3951 | Skill in writing about facts and ideas in a clear, convincing, and organized manner. |
Skill |
4072 | Knowledge of collection systems, capabilities, and processes. |
Knowledge |
4073 | Knowledge of the feedback cycle in collection processes. |
Knowledge |
4078 | Knowledge of target or threat cyber actors and procedures. |
Knowledge |
4079 | Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, white/black listing). |
Knowledge |
4085 | Knowledge of approved intelligence dissemination processes. |
Knowledge |
4086 | Knowledge of relevant laws, regulations, and policies. |
Knowledge |
4088 | Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure). |
Knowledge |
4089 | Knowledge of target communication tools and techniques. |
Knowledge |
4090 | Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes). |
Knowledge |
4094 | Knowledge of networking and internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.). |
Knowledge |
4095 | Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML). |
Knowledge |
4097 | Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network. |
Knowledge |
4099 | Knowledge of customer information needs. |
Knowledge |
4106 | Knowledge of analytic tools and techniques. |
Knowledge |
4113 | Knowledge of the request for information process. |
Knowledge |
4118 | Skill in identifying a target’s network characteristics. |
Skill |
4121 | Skill in assessing a target’s frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities). |
Skill |
4123 | Skill in conducting research using all available sources. |
Skill |
4125 | Skill in complying with the legal restrictions for targeted information. |
Skill |
4128 | Skill in developing intelligence reports. |
Skill |
4129 | Skill in evaluating and interpreting metadata. |
Skill |
4134 | Skill in identifying intelligence gaps and limitations. |
Skill |
4141 | Skill in providing analysis on target-related matters (e.g., language, cultural, communications). |
Skill |
4148 | Ability to review processed target language materials for accuracy and completeness. |
Ability |
4160 | Skill in interpreting traceroute results, as they apply to network analysis and reconstruction. |
Skill |
4165 | Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption). |
Knowledge |
4166 | Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types. |
Knowledge |
4396 | Knowledge of basic cloud-based technologies and concepts. |
Knowledge |
4421 | Knowledge of Critical Intelligence Communication (CRITIC) identification and reporting process. |
Knowledge |
4423 | Knowledge of cryptologic and SIGINT reporting and dissemination procedures. |
Knowledge |
4460 | Knowledge of how and when to request assistance from the Cryptanalysis and Signals Analysis and/or CNO. |
Knowledge |
4470 | Knowledge of intelligence sources and their characteristics. |
Knowledge |
4491 | Knowledge of methods, tools, sources, and techniques used to research, integrate and summarize information pertaining to target. |
Knowledge |
4523 | Knowledge of quality review process and procedures. |
Knowledge |
4570 | Knowledge of the overall mission of the Cyber Mission Forces (CMF). |
Knowledge |
4578 | Knowledge of the specific missions for CMF (i.e., Cyber Mission Teams (CMT), National Mission Teams (NMT), Combat Support Team (CST), National Support Team (NST), Cyber Protection Team (CPT). |
Knowledge |
4582 | Knowledge of the U.S. SIGNIT System (USSS) authorities, responsibilities, and contributions to the cyberspace operations mission. |
Knowledge |
4612 | Skill in conducting derivative classification IAW organization standards/Policy |
Skill |
4613 | Skill in conducting quality review of serialized reports and reporting for time-sensitive USCYBERCOM operations. |
Skill |
4619 | Skill in developing and maintaining target profiles. |
Skill |
4625 | Skill in drafting serialized reports to support time-sensitive USCYBERCOM operations. |
Skill |
4626 | Skill in drafting serialized reports to the quality level meeting release standards. |
Skill |
4629 | Skill in executing post publication processes IAW organization standards/Policy |
Skill |
4651 | Skill in providing feedback to enhance future collection and analysis. |
Skill |
4656 | Skill in recognizing exploitation opportunities. |
Skill |
4657 | Skill in recognizing targeting opportunities and essential information. |
Skill |
4662 | Skill in releasing serialized and time-sensitive reports. |
Skill |
8010 | Apply analytic techniques to validate information or data in reporting. |
Task |
8011 | Apply and/or develop analytic techniques to provide better intelligence. |
Task |
8013 | Apply customer requirements to the analysis process. |
Task |
8022 | Assist in the mitigation of collection gaps. |
Task |
8023 | Assist planners in the development of courses of action |
Task |
8038 | Conduct pre and post publication actions |
Task |
8063 | Develop analytical techniques to gain more target information. |
Task |
8065 | Develop and maintain target profiles using appropriate corporate tools and databases (e.g. Target associations, activities, communication infrastructures, etc.). |
Task |
8081 | Document and disseminate analytic findings. |
Task |
8090 | Enable targeting offices to find new sources of collection. |
Task |
8100 | Evaluate the strengths and weaknesses of the intelligence source. |
Task |
8101 | Evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
8108 | Identify and facilitate partner relationships to enhance mission capabilities |
Task |
8128 | Lead work role working groups/planning and development forums |
Task |
8137 | Manipulate information in mission relevant databases (e.g., converting data, generating reports). |
Task |
8138 | Mitigate collection gaps |
Task |
8145 | Perform network analysis to support new or continued collection. |
Task |
8149 | Perform quality review and provide feedback on the materials delivered on which analysis and reporting is conducted. |
Task |
8155 | Prioritize reporting based on SIGINT reporting instructions or other mission reporting priorities. |
Task |
8157 | Produce digital network intelligence against specific named target sets. |
Task |
8173 | Provide intel target recommendations which meet leadership objectives. |
Task |
8176 | Provide SME support for the development and implementation of exercises. |
Task |
8191 | Select, build, and develop query strategies against appropriate collection databases. |
Task |
8203 | Understand hacker TTPs and methodologies. |
Task |
8204 | Understand network components and their functionality to enable analysis and target development. |
Task |
8205 | Understand technologies used by a given target |
Task |
8213 | Verify and validate that network graphics are accurate and comply with reporting policy. |
Task |