Collaborates to identify access and collection gaps that can be satisfied through the cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.