The Electronic Warfare (EW) capabilities that the U.S. Military encounters are becoming much more sophisticated. This includes short-range tactical communications, long-range command and control (C2) communications networks, networked defensive systems, and radio frequency seekers. To meet these challenges, ISHPI provides support in developing and planning EW activities for exercises and real world contingencies. This work includes: developing EW portions of Contingency Plans (CONPLANS), Concept Of Operations (CONOPS) and Operational Orders (OPORDS); providing Information Operations (IO) support; providing Geospatial and Signal Intelligence (Geo/SIGInt) collection, analysis and dissemination; performing intelligence analysis and computer network operations, including monitoring and protection, cyber operations support; and utilizing collaboration tools and analysis to support the intelligence lifecycle. Our expertise extends to: radar and communications, including Independent, Verification and Validation (IV&V), Information Assurance Vulnerability alerts/Assessments (IAVAs) and bulletins (IAVBs); EW operational support, including EW threat analysis and database programming; and the development of various technical software applications and databases. Our highly qualified personnel are experienced in strategic planning, information and intelligence sharing, risk management, vulnerability assessments, consequence management, and first responder training.
Intelligence Operations Support
ISHPI provides IO support in the development, implementation and management of intelligence programs for the National Intelligence Community (IC). We provide direct sensitive intelligence support to the U.S. Southern Command (USSOUTHCOM), U.S. Central Command (USCENTCOM), and Joint Improvised Explosive Device Defeat Organization (JIEDDO). ISHPI personnel deliver full spectrum (intelligence cycle) support to numerous intelligence community customers, from requirements definition through product dissemination. Our experts deliver the resources and tools to help collect and analyze accurate and up-to-date information. They provide context to traditional intelligence information (e.g., image intelligence, signal intelligence, measurement and signature intelligence) to help prepare personnel in pre-deployment work-up stages and to perform research, experimentation, studies and analysis.
CONOPS
ISHPI personnel prepare CONOPS for Information Operations; IEDs (Improvised Explosive Devices); response teams; Joint Operation Centers; law enforcement operations; interagency training, education, and operations. They develop widespread capabilities and coordinate massive operations integrating local, state, and federal law enforcement, as well as Border Security operations and intelligence. To support U.S. Armed Forces forward-deployed planning efforts and analytic mission requirement, ISHPI integrates successfully proven methodologies, combining threat emulation and various red teaming analytics. This enables us to provide in-depth enemy perspectives and enemy forces Courses of Action (COA) and Concepts of Operations (CONOPS), delivering overall security and stability throughout various AORs and to U.S. Armed Forces forward deployed.
Vulnerability Assessments
Using a variety of assessment tools, ISHPI has conducted vulnerability assessments of both classified and unclassified IT systems, including networks, databases, applications, and operating systems. We have analyzed threat, attack and vulnerability information and conducted vulnerability testing for various DHS, DoD, and IC customers. Our experienced cyber experts regularly conduct vulnerability scans on enterprise systems using tools that include Retina, Nessus, SCAP, Gold Disk, Assured Compliance Assessment Solution (ACAS), IA Compliance System (IACS), eMASS, and XACTA. We document the results and provide vulnerability assessments to protect the confidentiality, availability and integrity of our customer’s mission-critical information. Our personnel regularly review customer site systems for possible weaknesses and generate all applicable documents within this process, including a description of the vulnerability, the applicable threat agent or threat source capable of exploiting the vulnerability, the likelihood of the occurrence of exploitation and its impact, and an assessment of the risk.