» Authority Central Intelligence - Information Central «
The Authority Central Intelligence (ACI) is an operative wing of the Authority specializing in the coordination of intelligence, counter-intelligence, cyber security, and espionage networks in and out of Authority facilities. The ACI operates in a vast network of information processing and filtration, being able to allocate and pinpoint sources containing critical data relating to Authority interests and concerns. Affiliated operatives ensure the foundational security and safety against various logistical threats, including espionage, sabotage, blackmail, and information breaches.
Embedded ACI operatives during a reconnaissance operation on the Indo-Tibetan border.
Description: The Authority Central Intelligence (ACI) is the integral body of the Authority's efforts for the collection, analysis, and exploitation of information pertaining to military, government, and commercial interests. The ACI maintains both a domestic and external area of operation, allowing for its assigned operatives to track and monitor assets of various organized bodies in order to maintain an up-to-date logistics network and intake of relevant or critical information.
Personnel in the ACI primarily consist of Authority-contracted personnel, although external military or civilian functionaries may be utilized in specific circumstances. All incoming candidates are enlisted in the Operative Indoctrination Program (OIP), consisting of a training period of eight months. During the initial five months, all candidates are taught the background, framework, and purpose of the Authority and its interests. This includes establishment of specialized skills, including basic thinking, writing, and briefing skills. Coursework additionally consists of analytic tools, counterintelligence issues, denial and deception analysis, and warning skills.
Upon completion of training, graduating operatives will be assigned to a specific department within the ACI. Each department consists of a specialized function in ensuring the proficiency and punctuality of the ACI's network:
- DEP-010: Intelligence Department
- DEP-022: Counterintelligence Department
- DEP-028: Science and Technology Department
- DEP-036: Operations Department
- DEP-039: Tactical Control Department
ACI cell operatives investigating an incident area following successful containment of RPC-███.
Newly-processed personnel are immediately placed under a probationary period of six months under the evaluation of an experienced senior operative. This period consists of said personnel's acclimation, comprehension, and enactment of their expected duties within the ACI. Routine psychological and physical evaluations are additionally performed during this time. All evaluation periods (ranging from DEP-010 through 039) are performed under identical duration and intensity.
ACI personnel relaying a dictation during a project assessment.
ACI personnel are not strictly garrisoned to specific Authority-affiliated facilities, instead permitting themselves to disseminate, both under covert or official capacities, across various locations. ACI personnel rotations additionally run under a non-fixed schedule; personnel may be recalled at any point in time in the event an assessment, debriefing, or transfer is required.
While adhering to a centralized command structure, the ACI provides substantial flexibility to its assigned operatives to ensure completion of objectives and independent decisionmaking abilities in the field. Operatives typically deploy in cells, consisting of four or five individuals, and relay collected information to an observing intelligence officer. Intelligence officers provide superior-ranking personnel information collected by subordinate operatives, relay said information to analysts for processing, and ensure the functionality and cohesion of their assigned cell.
Equipment: ACI personnel are provided equipment depending on three criteria: department the operative is currently assigned to, environment said operative is currently deployed in, and current objective being carried out by said operative. Equipment provided is adjusted relative to the aforementioned criteria in order to ensure personnel are properly equipped in order to fulfill duties/objectives as well as appropriate allocation of ACI resources. Field operatives are typically provided a concealable firearm, as well as various other utilities, to assist in the event of compromise or threat.
» Authority Central Intelligence - Personnel Assignments «
The Authority Central Intelligence (ACI) operates in a multitude of functions to fulfill the demanding fields of an intelligence organization. ACI personnel are employed in their respective departments, each dedicated to ensuring flow of information relayed between the ACI and involved third parties. All personnel are placed under a probationary period to permit acclimation of workplace environment and its resultant responsibilities before being granted full-time status.
Intelligence Department (DEP-010)
- The Intelligence Department (DEP-010) is responsible for the acquisition, analysis, and dissemination of intelligence gathered via various collection disciplines, including human sources, electronic and communications interceptions, satellite or surveillance imagery, and open sources. It is additionally responsible for the processing/filtering of acquired information reviewed by affiliated analysts to determine the accuracy and integrity of the originating source. In the event of direct intervention by the ACI or other Authority bodies, personnel instead utilize a target-centric intelligence cycle, consisting of an assessment and subsequent exploitation of a person/entity-of-interest.
Counterintelligence Department (DEP-022)
- The Counterintelligence Department (DEP-022) is responsible for the safeguarding and ensuring the integrity of the Authority's intelligence network. These methods primarily consist of defensive or collective counterintelligence procedures, including examinations of potential areas of exploitation within the Authority's framework as well as preventing efforts of foreign intelligence entities from infiltrating. Situations bearing sensitive or critical information, such as military operations, anomaly transportation, or facility construction, are secured by various countermeasures (such as deceptive intentional leaking, or covert misdirection in operational security practices) to protect Authority personnel.
Science and Technology Department (DEP-028)
- The Science and Technology Department (DEP-028) is responsible for the collection, analysis, and documentation of existing technology utilized by the Authority and other organizations of interest. Said technologies primarily consist of, but are not limited to: military, espionage, reconnaissance, and security utilities. In addition to technology acquisition, assigned personnel may be specialized to operate as computer technicians or engineers to assist in the development/augmentation of the Authority's technical collection systems of its various installations.
Operations Department (DEP-036)
- The Operations Department (DEP-036) is responsible for clandestine or covert missions that cannot be overtly handled by the Authority barring high security or information risk. Assigned personnel typically operate in unmarked attire to deter potential suspicion or accusation of Authority involvement during an operation. Personnel are additionally trained to ensure operational agility, adaptability, and deniability.
Tactical Control Department (DEP-039)
- The Tactical Control Department (DEP-039) is responsible for the deployment of assigned personnel to directly assist in field operations of other Authority-based military bodies, most notably ASF and MST. Personnel are typically deployed under reasons necessitating required expertise, knowledge of intelligence, navigational assistance, or reinforcement of mission objective. While most deployments are addressed to members of the hosting unit, personnel are periodically implanted under discrete circumstances citing security or covert concerns.
» Authority Central Intelligence - Affiliated Watchlist «
The Authority Central Intelligence (ACI) maintains a continuously-updating watchlist consisting of individuals, private/public companies, military organizations, groups and agencies-of-interest that demonstrate existing interests or concerns in the Authority's sphere of operations. In addition to the watchlist, the ACI maintains an active tip-based system, allowing for the acquisition and filtering of information from anonymous sources to assist in monitoring or tracking the aforementioned entities-of-interest.
Example template disseminated in Authority installations containing the physical description of the individual under watch.
The ACI organizes a watchlist alert system categorized by threat level and value. Each alert consists of photos, name, known associates, known aliases, last known whereabouts, reports of previous encounters, as well as last known whereabouts. If applicable, an individual's fingerprints and iris scan data may be attached. These features; however, are primarily dependent on whether said individual has been previously detained.
SEEK II model currently utilized by ACI field operatives.
The ACI watchlist is formed primarily off of intelligence data networked between Authority assets, outside agencies, and private security entities in a mutual aid arrangement. The use of biometric data in modern personal electronic devices, such as facial recognition and fingerprint scanning to unlock cell phones and laptops, has been used to covertly establish a large database of biometric data. Data which can be referenced by the Authority for its own investigative purposes.
Additionally, commercial DNA test-based genealogy databases can be accessed and referenced to locate relatives of individuals-of-interest in order to establish positive identification on previously anonymous samples collected during intelligence analysis of incidents. This program is currently in its infancy, but has been used to great effect in several previously unsolvable inquiries. Said program will continue to evolve and develop.
In lieu of recent developments to aforementioned databases, ACI expressed an increased incentive to develop methods permitting greater portability with regard to field operations. This has resulted in the adoption of the SEEK II instrument and is currently distributed exclusively to ACI detaches accompanying other Authority military bodies. The SEEK II instrument permits for operatives to acquire biometric data in cases necessitating urgent or drastic response where conventional means are difficult or impossible to carry out. All data may be then trasmitted via a 3G network or a direct USB connection.
TO PERSONNEL:
In lieu of recent developments of technology, both conventional and portable, the administration has authorized another $1.2 billion fund to assist in the broadening of our surveillance project. Central command will allocate these funds toward the reinforcement of the Authority's intelligence network against external and internal threats, as well as continuously improve our data-collection systems within the next several years. In regards to aforementioned improvements, a list of objectives has been developed.
In the next five years, ACI is projected to overhaul the SEEK II's network to accommodate a 3.75G transitory system before upgrading to a 4G variant. In addition, DEP-028's permissions and capabilities are to be extended to exercise oversight in all Authority-sanctioned research and development projects; agreements with various departmental heads are currently being conducted.
Finally, ACI is projected to improve existing relations with national intelligence organizations within the next three years. Due to the criticality of this objective, ACI is adopting a neutral stance toward existing global affairs in order to permit for greater leverage of potential assets or leads from said organizations. The aforementioned resources will further improve the information collecting abilities of the Authority as well as greatly assisting its military operations.
Signed,
Matthew D. O'Shea, Deputy Director