Target Digital Network Analyst
The TDNA conducts advanced analysis of collection and open-source data to ensure target continuity, profile targets and their activities, and develop techniques to gain more target cyberspace operations related information. They possess knowledge of target cyberspace technologies and apply skills and knowledge of cyberspace networks and the applications on them to determine how targets communicate, move, operate, and live within the cyberspace domain. TDNAs apply analytical techniques to review relevant content carried in target cyberspace communications. The TDNA uses data from networks of all forms for target development. TDNAs are technology savvy and can be flexible enough to rapidly shift from one target to another.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
244 | Ability to determine the validity of technology trend data. |
Ability |
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
915 | Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
Knowledge |
1056 | Knowledge of operations security. |
Knowledge |
2001 | Accurately characterize targets. |
Task |
2059 | Provide expertise to course of action development. |
Task |
2066 | Provide expertise to the development of measures of effectiveness and measures of performance. |
Task |
2081 | Classify documents in accordance with classification guidelines. |
Task |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
Task |
2089 | Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. |
Task |
2099 | Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets. |
Task |
2101 | Identify and conduct analysis of target communications to identify information essential to support operations. |
Task |
2134 | Conduct target research and analysis. |
Task |
2195 | Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology. |
Task |
2236 | Determine if information meets reporting requirements. |
Task |
2243 | Determine what technologies are used by a given target. |
Task |
2249 | Develop all-source intelligence targeting materials. |
Task |
2251 | Apply analytic techniques to gain more target information. |
Task |
2289 | Develop measures of effectiveness and measures of performance. |
Task |
2356 | Engage customers to understand customers’ intelligence needs and wants. |
Task |
2393 | Generate and evaluate the effectiveness of network analysis strategies. |
Task |
2400 | Examine intercept-related metadata and content with an understanding of targeting significance. |
Task |
2427 | Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.) |
Task |
2429 | Generate requests for information. |
Task |
2434 | Identify threat tactics, and methodologies. |
Task |
2441 | Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
2453 | Identify collection gaps and potential collection strategies against targets. |
Task |
2458 | Identify critical target elements. |
Task |
2459 | Identify intelligence gaps and shortfalls. |
Task |
2469 | Identify network components and their functionality to enable analysis and target development. |
Task |
2515 | Initiate requests to guide tasking and assist with collection management. |
Task |
2542 | Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications. |
Task |
2568 | Make recommendations to guide collection in support of customer requirements. |
Task |
2608 | Monitor target networks to provide indications and warning of target communications changes or processing failures. |
Task |
2621 | Provide SME and support to planning/developmental forums and working groups as appropriate. |
Task |
2628A | Provide subject matter expertise to development of exercises. |
Task |
2628 | Participate in exercises. |
Task |
2639 | Perform content and/or metadata analysis to meet organization objectives. |
Task |
2719 | Profile targets and their activities. |
Task |
2749 | Provide input for targeting effectiveness assessments for leadership acceptance. |
Task |
2770 | Provide time sensitive targeting support. |
Task |
2779 | Review appropriate information sources to determine validity and relevance of information gathered. |
Task |
2798 | Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources. |
Task |
2818 | Sanitize and minimize information to protect sources and methods. |
Task |
2840 | Support identification and documentation of collateral effects. |
Task |
2893 | Assess, document, and apply a target’s motivation and/or frame of reference to facilitate analysis, targeting and collection opportunities. |
Task |
2894 | Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination. |
Task |
2897 | Conduct analysis of target communications to identify essential information in support of organization objectives. |
Task |
2902 | Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing. |
Task |
2905 | Identify target communications within the global network. |
Task |
2906 | Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis. |
Task |
2909 | Provide feedback to collection managers to enhance future collection and analysis. |
Task |
2919 | Perform social network analysis and document as appropriate. |
Task |
2922 | Tip critical or time-sensitive information to appropriate customers. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3020 | Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information. |
Ability |
3021 | Ability to collaborate effectively with others. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3052 | Ability to identify intelligence gaps. |
Ability |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
Ability |
3074 | Ability to recognize and mitigate deception in reporting and analysis. |
Ability |
3077 | Ability to think critically. |
Ability |
3078 | Knowledge of target methods and procedures. |
Knowledge |
3081 | Ability to utilize multiple intelligence sources across all intelligence disciplines. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3113 | Knowledge of target intelligence gathering and operational preparation techniques and life cycles. |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3158 | Knowledge of cyber operation objectives, policies, and legalities. |
Knowledge |
3166 | Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies. |
Knowledge |
3172 | Knowledge of collection sources including conventional and non-conventional sources. |
Knowledge |
3174 | Knowledge of the intelligence requirements development and request for information processes. |
Knowledge |
3179 | Knowledge of common networking devices and their configurations. |
Knowledge |
3181 | Knowledge of common reporting databases and tools. |
Knowledge |
3219 | Knowledge of cyber operations. |
Knowledge |
3237 | Knowledge of denial and deception techniques. |
Knowledge |
3242 | Knowledge of document classification procedures, policy, resources, and personnel. |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3281 | Knowledge of governing authorities for targeting. |
Knowledge |
3288 | Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless). |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3296 | Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http). |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3324 | Knowledge of information and collateral intelligence sources. |
Knowledge |
3338 | Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions. |
Knowledge |
3346 | Knowledge of Internet and routing protocols. |
Knowledge |
3367 | Knowledge of all applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. |
Knowledge |
3368 | Knowledge of legal considerations in targeting. |
Knowledge |
3382 | Knowledge of methods to integrate and summarize information from any potential sources. |
Knowledge |
3386 | Knowledge of midpoint collection (process, objectives, organization, targets, etc.). |
Knowledge |
3407 | Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3418 | Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors). |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3450 | Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure. |
Knowledge |
3505 | Knowledge of strategies and tools for target research. |
Knowledge |
3534 | Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference. |
Knowledge |
3542 | Knowledge of the basic structure, architecture, and design of converged applications. |
Knowledge |
3564 | Knowledge of the data flow from collection origin to repositories and tools. |
Knowledge |
3582 | Knowledge of the intelligence frameworks, processes, and related systems. |
Knowledge |
3587 | Knowledge of targeting cycles. |
Knowledge |
3595 | Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements. |
Knowledge |
3603 | Knowledge of the principal methods, procedures, and techniques of gathering information and producing intelligence. |
Knowledge |
3608 | Knowledge of the purpose and contribution of target templates. |
Knowledge |
3616 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3617 | Knowledge of the structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3626 | Knowledge of the organization’s planning, operations and targeting cycles. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3664 | Skill in identifying how a target communicates. |
Skill |
3667 | Skill in analyzing a target’s communication networks. |
Skill |
3678 | Skill in analyzing traffic to identify network devices. |
Skill |
3689 | Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses). |
Skill |
3692 | Skill in assessing the applicability of available analytical tools to various situations. |
Skill |
3708 | Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis. |
Skill |
3737 | Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects. |
Skill |
3765 | Skill in disseminating items of highest intelligence value in a timely manner. |
Skill |
3771 | Skill in evaluating data sources for relevance, reliability, and objectivity. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3773 | Skill in evaluating information to recognize relevance, priority, etc. |
Skill |
3774 | Skill in evaluating accesses for intelligence value. |
Skill |
3778 | Skill in exploiting/querying organizational and/or partner collection databases. |
Skill |
3787 | Skill in identifying a target’s communications networks. |
Skill |
3797 | Skill in identifying leads for target development. |
Skill |
3803 | Skill in identifying, locating, and tracking targets via geospatial analysis techniques |
Skill |
3812 | Skill in interpreting metadata and content as applied by collection systems. |
Skill |
3822 | Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results. |
Skill |
3828 | Skill in navigating network visualization software. |
Skill |
3863 | Skill in recognizing midpoint opportunities and essential information. |
Skill |
3864 | Skill in recognizing relevance of information. |
Skill |
3865 | Skill in recognizing significant changes in a target’s communication patterns. |
Skill |
3867A | Skill in recognizing technical information that may be used for target development including intelligence development. |
Skill |
3873 | Skill in researching essential information. |
Skill |
3885 | Skill in fusion analysis |
Skill |
3890 | Skill in synthesizing, analyzing, and prioritizing meaning across data sets. |
Skill |
3908 | Skill in using research methods including multiple, different sources to reconstruct a target network. |
Skill |
3915 | Skill in using geospatial data and applying geospatial resources. |
Skill |
3923 | Skill in using non-attributable networks. |
Skill |
3951 | Skill in writing about facts and ideas in a clear, convincing, and organized manner. |
Skill |
4072 | Knowledge of collection systems, capabilities, and processes. |
Knowledge |
4073 | Knowledge of the feedback cycle in collection processes. |
Knowledge |
4078 | Knowledge of target or threat cyber actors and procedures. |
Knowledge |
4079 | Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, white/black listing). |
Knowledge |
4085 | Knowledge of approved intelligence dissemination processes. |
Knowledge |
4086 | Knowledge of relevant laws, regulations, and policies. |
Knowledge |
4088 | Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure). |
Knowledge |
4089 | Knowledge of target communication tools and techniques. |
Knowledge |
4090 | Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes). |
Knowledge |
4094 | Knowledge of networking and internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.). |
Knowledge |
4095 | Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML). |
Knowledge |
4097 | Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network. |
Knowledge |
4099 | Knowledge of customer information needs. |
Knowledge |
4106 | Knowledge of analytic tools and techniques. |
Knowledge |
4118 | Skill in identifying a target’s network characteristics. |
Skill |
4121 | Skill in assessing a target’s frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities). |
Skill |
4123 | Skill in conducting research using all available sources. |
Skill |
4125 | Skill in complying with the legal restrictions for targeted information. |
Skill |
4128 | Skill in developing intelligence reports. |
Skill |
4129 | Skill in evaluating and interpreting metadata. |
Skill |
4134 | Skill in identifying intelligence gaps and limitations. |
Skill |
4141 | Skill in providing analysis on target-related matters (e.g., language, cultural, communications). |
Skill |
4160 | Skill in interpreting traceroute results, as they apply to network analysis and reconstruction. |
Skill |
4165 | Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption). |
Knowledge |
4166 | Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types. |
Knowledge |
4223 | Ability to contribute to the collection management process |
Ability |
4421 | Knowledge of Critical Intelligence Communication (CRITIC) identification and reporting process. |
Knowledge |
4423 | Knowledge of cryptologic and SIGINT reporting and dissemination procedures. |
Knowledge |
4428 | Knowledge of cybersecurity concepts and principles. |
Knowledge |
4431 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
4460 | Knowledge of how and when to request assistance from the Cryptanalysis and Signals Analysis and/or CNO. |
Knowledge |
4470 | Knowledge of intelligence sources and their characteristics. |
Knowledge |
4490 | Knowledge of methods, tools, sources, and techniques used to research, integrate and summarize all-source information pertaining to target. |
Knowledge |
4523 | Knowledge of quality review process and procedures. |
Knowledge |
4533 | Knowledge of SIGINT laws and directives. |
Knowledge |
4570 | Knowledge of the overall mission of the Cyber Mission Forces (CMF). |
Knowledge |
4578 | Knowledge of the specific missions for CMF (i.e., Cyber Mission Teams (CMT), National Mission Teams (NMT), Combat Support Team (CST), National Support Team (NST), Cyber Protection Team (CPT). |
Knowledge |
4582 | Knowledge of the U.S. SIGNIT System (USSS) authorities, responsibilities, and contributions to the cyberspace operations mission. |
Knowledge |
4631 | Skill in geolocating targets. |
Skill |
4643 | Skill in operational use of raw collection databases. |
Skill |
4645 | Skill in performing data fusion from all-source intelligence for geospatial analysis. |
Skill |
4651 | Skill in providing feedback to enhance future collection and analysis. |
Skill |
4656 | Skill in recognizing exploitation opportunities. |
Skill |
4659 | Skill in recognizing the value of survey data. |
Skill |
4667 | Skill in selector normalization. |
Skill |
4669 | Skill in targeting (e.g., selectors). |
Skill |
8011 | Apply and/or develop analytic techniques to provide better intelligence. |
Task |
8013 | Apply customer requirements to the analysis process. |
Task |
8023 | Assist planners in the development of courses of action |
Task |
8025 | Be aware of hacker TTPs and methodologies. |
Task |
8063 | Develop analytical techniques to gain more target information. |
Task |
8064 | Develop and lead exercises |
Task |
8065 | Develop and maintain target profiles using appropriate corporate tools and databases (e.g. Target associations, activities, communication infrastructures, etc.). |
Task |
8081 | Document and disseminate analytic findings. |
Task |
8090 | Enable targeting offices to find new sources of collection. |
Task |
8100 | Evaluate the strengths and weaknesses of the intelligence source. |
Task |
8108 | Identify and facilitate partner relationships to enhance mission capabilities |
Task |
8128 | Lead work role working groups/planning and development forums |
Task |
8137 | Manipulate information in mission relevant databases (e.g., converting data, generating reports). |
Task |
8138 | Mitigate collection gaps |
Task |
8145 | Perform network analysis to support new or continued collection. |
Task |
8157 | Produce digital network intelligence against specific named target sets. |
Task |
8172 | Provide input to training and mitigation plan based on advancements in hardware and software technologies (e.g. attend training or conferences, reading) and their potential implications. |
Task |
8173 | Provide intel target recommendations which meet leadership objectives. |
Task |
8178 | Provide time sensitive support to operations. |
Task |
8191 | Select, build, and develop query strategies against appropriate collection databases. |
Task |
8205 | Understand technologies used by a given target |
Task |