[go: up one dir, main page]

0% found this document useful (0 votes)
88 views17 pages

INTELLIGENCE Equipment For Collecting Information (Sigint, Geoint)

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 17

INTELLIGENCE equipment

for collecting information


(SIGINT, GEOINT)

Realized by
Corporal Student Constantin DUNGACIU
21B Group, ML
CONTENTS
INTRODUCTION

• Intelligence
 Concept
 Disciplines
• SIGINT
 Concept and purposes
 Types
 Caracteristics
• GEOINT
 Concept and purposes
 Types
 Principles

CONCLUSION
SOURCES
INTRODUCTION
Concept:
Intelligence
Intelligence – the product resulting from the collection, evaluation,
integration and interpretation of all available information which concerns one
or more aspects of foreign nations or of areas of operation and which is
immediately or potentially significant to planning (Dictionary of United
Military Terms for Joint Usage)

There is a list of intelligence gathering disciplines:


• HUMINT
• MASINT
• OSINT
• TECHINT
• CYBINT/DNINT
• FININT
Among which SIGINT and GEOINT.
SIGINT - Signals intelligence
Concept and purposes:

 are gathered from interception of signals

 subset of intelligence collection management


 as sensitive information is often encrypted, SIGINT in turn involves
the use of cryptanalysis to decipher the messages
 traffic analysis - the study of who is signaling whom and in what
quantity - is also used to integrate information again
SIGINT - Signals intelligence

Types:
Has many sub-disciplines, among which :
• Communications intelligence (COMINT) -communications
among people
• Electronic intelligence (ELINT) – gathered from electronic
signals that do not contain speech or text (which are considered
COMINT)
o Foreign instrumentation signals intelligence (FISINT) – entails the collection and analysis
of telemetry data from a missile or sometimes from aircraft tests; formerly known as 
telemetry intelligence or TELINT
COMINT
Caracteristics:
Will reveal some or all of the following:
• Who is transmitting
• Where they are located, and, if the transmitter is moving, the
report may give a plot of the signal against location

• If known, the organizational function of the transmitter


• The time and duration of transmission, and the schedule if it
is a periodic transmission

• The frequencies and other technical characteristics of their transmission


• If the transmission is encrypted or not, and if it can be decrypted
• The addresses, if the signal is not a general broadcast and if addresses
are retrievable from the message. These stations may also be COMINT
(e.g., a confirmation of the message or a response message), ELINT (e.g.,
a navigation beacon being activated) or both
Voice interception
A basic COMINT technique is to listen for voice communications, usually
over radio but possibly "leaking" from telephones or from wiretaps. If the voice
communications are encrypted, traffic analysis may still give information.

E.g.: In the Second World War, for security the United States
used Native American volunteer communicators known as 
code talkers, who used languages such as Navajo, Comanche
 and Choctaw, which would be understood by few people, even
in the U.S. Even within these uncommon languages, the code
talkers used specialized codes, so a "butterfly" might be a specific
Japanese aircraft. British forces made limited use of Welsh
 speakers for the same reason.
Text interception
Morse code is still used by military forces of former Soviet Union countries.
• Specialists scan radio frequencies for character sequences (e.g., electronic
mail) and fax.
Signaling channel interception
Retrospective analysis of telephone calls can be made from 
Call detail record (CDR) used for billing the calls.

Monitoring friendly communications


A security monitor may hear an individual transmitting inappropriate information over an
unencrypted radio network, or simply one that is not authorized for the type of information
being given. If immediately calling attention to the violation would not create an even greater
security risk, the monitor will call out one of the BEADWINDOW codes used by Australia,
Canada, New Zealand, the United Kingdom, the United States, and other nations working
under their procedures.
Standard BEADWINDOW codes (e.g., "BEADWINDOW 2") include:
• Position
• Capabilities
• Operations
• Electronic warfare (EW):
• Friendly or enemy key personnel
• Communications security (COMSEC)
• Wrong circuit
• Other codes as appropriate for the situation may be defined by the
commander.

E.g.: In WWII, the Japanese Navy, by poor practice, identified a key person's
movement over a low-security cryptosystem. This made possible 
Operation Vengeance, the interception and death of the Combined Fleet
commander, Admiral Isoroku Yamamoto.
ELINT
Caracteristics:
- complementary relationship to COMINT
- combining other sources of information and ELINT allows
traffic analysis to be performed on electronic emissions which
contain human encoded messages. The method of analysis differs
from SIGINT in that any human encoded message which is in the
electronic transmission is not analyzed during ELINT.
Role in air warfare
A very common area of ELINT is intercepting radars and learning their locations
and operating procedures. Attacking forces may be able to avoid the coverage of
certain radars, or, knowing their characteristics, electronic warfare units may jam
radars or send them deceptive signals. Confusing a radar electronically is called a
"soft kill", but military units will also send specialized missiles at radars, or bomb
them, to get a "hard kill". Some modern air-to-air missiles also have radar homing
guidance systems, particularly for use against large airborne radars.

Knowing where each surface-to-air missile and anti-aircraft artillery


system is and its type means that air raids can be plotted to avoid the most
heavily defended areas and to fly on a flight profile which will give the
aircraft the best chance of evading ground fire and fighter patrols. It also
allows for the jamming or spoofing of the enemy's defense network (see
electronic warfare). Good electronic intelligence can be very important to
stealth operations; stealth aircraft are not totally undetectable and need to
know which areas to avoid. Similarly, conventional aircraft need to know
where fixed or semi-mobile air defense systems are so that they can shut
them down or fly around them.
GEOINT - Geospatial intelligence

Concept and purposes:


 an intelligence discipline comprising the exploitation and analysis of geospatial data and
information to describe, assess, and visually depict physical features (both natural and
constructed) and geographically reference activities on Earth
 are gathered from satellite and aerial photography, or mapping/terrain data

Types:
Imagery intelligence (IMINT) – gathered from satellite and aerial photography
It is suggested that GEOINT is just a new term used to identify a broad range of outputs
from intelligence organizations that use a variety of existing spatial skills and disciplines
including:
•  photogrammetry
•  cartography
• imagery analysis
•  remote sensing
•  terrain analysis
Principles:
Bacastow, professor of practice for geospatial intelligence in Penn State's
Dutton e-Education Institute, suggested the following First Principles as
markers that define the professional domain in terms of uniqueness and value:

GEOINT, rooted in the geospatial


sciences, geospatial technologies and a
tradecraft that seeks knowledge to
achieve a decision advantage.

Analysis occurs as a human-machine team.

GEOINT reveals how human action is constrained


by the physical landscape and human perceptions
of Earth.

GEOINT seeks to anticipate patterns of life


through time.

The data and technical systems reflect


human biases.
CONCLUSION
TACTICAL INTELLIGENCE

POTENTIAL TARGETS
1. Military Operational Enviroments
2. Terrorists Targets
3. Espionages COLLECTION METHODS
4. Friendly Accredited Diplomats 1. HUMINT
5. Military Attaches 2. SIGINT
6. Non-governmental Organizations 3. IMINT
7. Patrolling military police 4. OSINT
8. Prisoners 5. GEOINT
9. Strategic prisoners of War or Detainees
10. Traveler Debriefing Eg CIA Domestic Service
SOURCES:
 https://whatis.techtarget.com/definition/COMINT-communications-intelligence
 https://www.comintconsulting.com/
 https://www.nsa.gov/what-we-do/signals-intelligence/
 https://web.archive.org/web/20070901131123/http://
www.nor.com.au/community/sarc/acp124~1.pdf
 https://usgif.org/system/uploads/4510/original/2016_SoG_book.pdf
 http://
eijournal.com/print/column/defense-watch/defining-first-principles-of-geospatial-i
ntelligence
 https://www.nga.mil/MediaRoom/Pathfinder/Pages/Archive.aspx
 https://www.geog.psu.edu/directory/todd-s-bacastow

You might also like