Many organizations struggle with creating intelligence requirements often creating them all as priorities. (IRs) and the ability to shift to priority intelligence requirements (PIRs) when needed. This method supports situational awareness, contributes to the intelligence preparation of the cyber battlefield, and allows rapid shifts in priorities. The method also ensures measurements in change from a strategic level (geopolitical/socio-cultural) through operational, and tactical levels. A critical factor during our research efforts is the determination of what indicators at the strategic, operational, and tactical levels to monitor.
Intelligence Requirements is defined as any subject, general or specific, upon which there is a need for the collection of information or the production of intelligence. A requirement for intelligence to fill a gap in organizational knowledge or understanding of the operational environment or threat actors.
Treadstone 71 helps you identify significant information gaps about the adversary and other relevant aspects of the operating environment supporting situational awareness. We help you state priorities for intelligence support. These are items stakeholders need to understand about the adversary or the operational environment. Intelligence requirements define targeted information stakeholders must know about threats to make decisions.
The effective management of your intelligence activities relies on the prioritization of the intelligence requirements against which available intelligence capabilities may be employed. For this reason, we write intelligence requirements and prioritize them determined by the ability of the resulting intelligence to inform your stakeholder’s and support their decisions.
The relative priority an intelligence requirement is assigned should reflect the criticality of the decision it is intended to support. Simply put, some decisions are more critical than others. For instance, the identification of a new threat actor without clear understanding of the actor’s capabilities or even if they may see your company as a target is less of a priority than an existing threat actor known to target your company with new methods of infiltration and a change in intent from espionage to sabotage in the form of disk wiping.
At Treadstone 71, we use standard taxonomy as a common unifier for understanding. This is critical for the accurate creation and communication of intelligence requirements.
Please complete the Contact form to receive the Data Sheet