Counterterrorism
IRREGULAR WARFARE
• Counter IED Forensics
• Computational Sciences Research and Development
• Stabilization, Security, Transition, and Reconstruction Operations
IDENTITY RESOLUTION
• Design, Build and Maintain Biometrics Networks
• Theater Exploitation Database (TED) Administration
• Exercise Planner
Intelligence Operations
• Identity Intelligence (I2)/ Biometrics/Counter
Improvised Explosive Device (C-IED) Support
• Intelligence, Surveillance, and Reconnaissance (ISR):
Sensor operations/Microelectronics
• Targeting
• HUMINT/SIGINT/GEOINT/MASINT/OSINT
• Cyber/Space/Infrastructure
• Processing, Exploitation & Dissemination (PED): AI/ML
• Forensics/Exploitation, Document and
Media Exploitation
• Counter-Proliferation/CWMD
• All Source Intelligence