Intelligence Collection 1nbsped 1452271852 9781452271859
Intelligence Collection 1nbsped 1452271852 9781452271859
All rights reserved. No part of this book may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying, recording, or by any information storage and retrieval
system, without permission in writing from the publisher.
Clark, Robert M.
pages cm
Includes bibliographical references and index.
JF1525.I6.C57 2014
327.12—dc23 2013006588
13 14 15 16 17 10 9 8 7 6 5 4 3 2 1
FOR INFORMATION:
CQ Press
An Imprint of SAGE Publications, Inc.
2455 Teller Road
Thousand Oaks, California 91320
E-mail: order@sagepub.com
• recruiters for the intelligence community who bring in the talented people
who develop collection systems and engage in collection activity.
Acronym Description
ACINT intelligence collected from underwater sound
ACOUSTINT intelligence collected from sound in air
AEOS Advanced Electro-Optical System
AESA active electronically scanned array
AFMIC Armed Forces Medical Intelligence Center (now the National
Center for Military Intelligence)
AGI advanced geospatial intelligence
ALCOR ARPA Lincoln C-band Observable Radar
ALTAIR ARPA Long-range Tracking and Identification Radar
AMAN Military Intelligence Directorate (Israel)
BBC British Broadcasting Company
BE Basic encyclopedia or bombing encyclopedia
BIMA Biometrics Identity Management Agency
BMD ballistic missile defense
BW biological warfare
C&C Command and control
CB Citizen’s band (radio)
CBW chemical and biological warfare
CCD charge-coupled device or coherent change detection
CCS collaborative collection strategies
CDAA circularly disposed antenna array
CIA Central Intelligence Agency
CNA computer network attack
CNE computer network exploitation
COBRA Collection by Remote Assets
COMINT communications intelligence
CW chemical warfare or continuous wave
D&D denial and deception
dB decibels
dBW decibels above or below one watt
DF direction finding
DCI Director of Central Intelligence
DCID Director of Central Intelligence Directive
DEA Drug Enforcement Agency
DHS Department of Homeland Security or Defense HUMINT
Service
DIA Defense Intelligence Agency
DNA deoxyribonucleic acid
DNI Director of National Intelligence
DoD Department of Defense
DSP defense support program
ECM electronics countermeasures
ELINT electronic intelligence
EM electromagnetic
EMP electromagnetic pulse
EMR electromagnetic radiation
EO electro-optical
EPL ELINT parameters list
ERS-1 European remote sensing satellite
ESA European Space Agency
FBI Federal Bureau of Investigation
FDOA frequency difference of arrival
FIRCAP Foreign Intelligence Requirements, Categories, and Priorities
FISINT foreign instrumentation systems intelligence
FLIR forward-looking infrared
FM frequency modulation
FOV field of view
FSB Federal’naya Sluzhba Bezopasnosti (Federal Security Service)
(Russia)
GAO Government Accountability Office
GCHQ General Communications Headquarters (UK)
GDIP General Defense Intelligence Program
GEO geostationary orbit
GEODSS ground-based electro-optical deep space surveillance system
GEOINT geospatial intelligence
GMTI ground moving target indicator
GPS global positioning system
GRU Glavnoye Razvedyvatel’noye Upravleniye (Main Intelligence
Directorate) (Russia)
GSD ground sample distance
GSM global system for mobile communications
HEO highly elliptical orbit
HF high frequency
HIIDE handheld interagency identity detection equipment
HPM high power microwave
HSI hyperspectral imaging
HUMINT human intelligence
I&W indications and warning
IC intelligence community
IC-MAP Intelligence Community Multi-intelligence Acquisition
Program
ICARS Intelligence Community Analysis and Requirements System
ICBM intercontinental ballistic missile
ICM Integrated Collection Management
IED improvised explosive device
IEEE Institute of Electrical and Electronics Engineers
IFOV instantaneous field of view
IIR intermediate infrared or intelligence information report
IMINT imagery intelligence
IMS International Monitoring System
IR infrared
ISAR inverse synthetic aperture radar
ISR intelligence, surveillance, and reconnaissance
ITU International Telecommunications Union
IUSS integrated undersea surveillance system
JCMEC Joint Captured Materiel Exploitation Center
JCMT joint collection management tools
JSTARS Joint Surveillance and Target Attack Radar System
JWICS Joint Worldwide Intelligence Communication System
KGB Komityet Gosudarstvennoy Bezopasnosti (Committee for
State Security) (Russia)
KIQ key intelligence question
LEO low earth orbit
LFM linear frequency modulation
LITINT literature intelligence
LPI low probability of intercept
LWIR long wavelength infrared
MAD magnetic anomaly detector
MANPADS man-portable air defense system
MASINT measurements and signatures intelligence
MATTS Marine Asset Tag Tracking System
MEMS micro electro-mechanical systems
MEO medium earth orbit
MHz megahertz
MICE money, ideology, compromise (or coercion), ego
MRS MASINT Requirements System
MSI multispectral imaging
MTI moving target indicator
Mv visual magnitude
MWIR mid-wavelength infrared
NASA National Aeronautics and Space Administration
NCMI National Center for Medical Intelligence
NCS National Clandestine Service
NGA National Geospatial-Intelligence Agency
NGIC National Ground Intelligence Center
NGO nongovernmental organization
NIC-C National Intelligence Coordination Center
NIE national intelligence estimate
NIH not invented here
NIIRS National Imagery Interpretability Rating Scale
NIPF National Intelligence Priorities Framework
NIR near infrared
NITC National Intelligence Tasking Center
NOAA National Oceanic and Atmospheric Administration
NORAD North American Aerospace Defense Command
NPIC National Photographic Interpretation Center
NRO National Reconnaissance Office
NSA National Security Agency
NSC National Security Council
NSRP National SIGINT Requirements Process
NTM national technical means
NUCINT collection of nuclear debris and radiation
ONIR overhead nonimaging infrared
OPIR overhead persistent infrared
OPTINT collection of nonimaging optical intelligence
OSC Open Source Center
OSINT open source intelligence
OSRMS Open Source Requirements Management System
OTH over-the-horizon
PDA personal digital assistant
PDD-35 Presidential Decision Directive 35
PED processing, exploitation, and dissemination
PHD phase history data
PLA People’s Liberation Army (China)
PRF pulse repetition frequency
PRI pulse repetition interval
QRC quick reaction capability
R/V or RV reentry vehicle
RADINT radar intelligence
RCS radar cross-section
RDT&E research, development, test, and evaluation
RF radio frequency
RFI radio frequency interference
RFID radio frequency identification
RMS Requirements Management System
S&T scientific and technical
SAM surface-to-air missile
SAP Special Access Program
SAR synthetic aperture radar
SARS severe acute respiratory syndrome
SBIRS Space-Based Infrared System
SECAR Surface-wave Extended Coastal Area Radar
SIGINT signals intelligence
SIPRNet Secret Internet Protocol Router Network
SIR-C a SAR carried on the space shuttle
SIS Secret Intelligence Service (also known as MI-6) (UK)
SLBM submarine launched ballistic missile
SNR signal-to-noise ratio
SOI space object identification
SOSUS sound surveillance system
SPOT Satellite Pour l’Observation de la Terre (French imagery
satellite)
STRATCOM U.S. Strategic Command
SVR Sluzhba Vneshney Razvedki (Foreign Intelligence Service)
(Russia)
SWIR short wavelength infrared
TDOA time difference of arrival
TEL transporter-erector-launcher
TEMPEST name given to a process for shielding electronics equipment to
suppress emissions
TIRA tracking and imaging radar
TPED tasking, processing, exploitation, and dissemination
TRADEX Target Resolution and Discrimination Experiment radar
TT&C telemetry, tracking, and commanding
UAV unmanned aeronautical vehicle
This book is organized into three parts, as shown in Figure 1.1: Parts I and II
address literal intelligence and nonliteral intelligence. Part III concerns
managing intelligence collection.
The logic of the literal/nonliteral intelligence division has been recognized
by other writers about intelligence. British author Michael Herman, as quoted in
Figure 1.1, has written that there are two basic types of collection: One produces
access to human thought processes (literal). One produces evidence in the form
of observations and measurements of things (nonliteral). 1
FUNCTION
Function determines what a system produces and for whom. In collection that
means determining who the customers are, what is produced for them, the
purposes that the product serves, and how valuable it is to them. Most chapters
in Part I also have a brief discussion of the sources following the function
section.
But there is another way to look at the function performed—by the nature
of the product and the customer set.
Much intelligence collection is high volume, with automated processing of
a mass of material, which then is disseminated widely. Customers and all-source
analysts get a great deal of open source, HUMINT, IMINT, and signals
intelligence (SIGINT) without having to ask for it.
The other kind is targeted or boutique collection. Think of the contrast
between a Wal-Mart and a boutique store such as Tiffany’s that caters to a select
customer set. Targeted collection is usually expensive, produced in small
quantity for a few customers. It requires extensive processing and exploitation.
The collection INTs shown in brown in Figure 1.3 are targeted. Those
shown in blue are usually high volume collection but sometimes are targeted.
ELINT is an example: it can be either, as we’ll see in Chapter 13.
PROCESS
Process, in this book, refers to how information moves through the collection
phase to get to the customers. It is often described as the intelligence cycle, but
this is a misnomer; intelligence generally, and collection in particular, does not
work as a cycle.
STRUCTURE
Structure refers to how a system is organized and why. It considers the driving
forces that shape the configuration of the system.
When applied to collection, structure is needed to efficiently (that is, in the
least costly and most timely way) and effectively (that is, to succeed with
minimum risk) obtain useful intelligence. You want a structure that can carry out
the process and achieve the function. We’re going to spend most of the time on
the function and process of collection. We’ll talk only in general terms about
structure in this book. The collection organizations and programs keep changing
and will continue to change, driven by bureaucratic considerations. But the basic
processes and functions endure.
All collection structures are compromises, with their attendant problems.
We’ll discuss those in some detail. The structures vary within each collection
discipline, but they have two recurring themes: whether to create a stovepipe or a
collaborative structure and how much to centralize versus distributing the
collection function.
“Stovepipe” versus Collaborative Structure. Most countries divide collection
methods using the INT (short for intelligence) guilds to protect equities—that is,
to define the areas of collection responsibility of large collection organizations.
In the United States, for example, the National Geospatial-Intelligence Agency
(NGA) is responsible for IMINT. SIGINT is a responsibility of the National
Security Agency (NSA) in the United States and of the General Communications
Headquarters (GCHQ) in the United Kingdom. So INT names are the result of
bureaucratic initiatives, not proper INT descriptions. These are what we call the
stovepipes. The division used in the United States, and followed to some extent
in several countries, is shown in Figure 1.5.
Stovepipe, as noted in the preface, is the term used to describe a structure
that is a relatively isolated vertical conduit for intelligence. Stovepipes are
common among collection organizations at the national level. They are less so at
the tactical military and law enforcement levels. Compartmentation is a key part
of the reason for a stovepipe structure. Such compartmentation reduces the risks
of disclosures that cause national embarrassment or loss of sources (e.g., the
WikiLeaks disclosures during 2010). So intelligence collection organizations use
various forms of compartmentation, especially to protect what are sometimes
called their crown jewels—their most sensitive products. This book discusses
some of the structures and processes they use to do that.
FIGURE 1.5 Stovepipe Structure of Intelligence Collection
Fusion centers work well at the lower classification levels where protection of
sources and methods is not such a critical issue. But the more widely sensitive
information is shared, the more likely it is to become openly known. As a simple
example, suppose that 99.9 percent of a group can be trusted to protect a secret.
By the time the group has grown to 1,000 members, you’re down to about a 36-
percent chance that it’s still a secret.
Centralized versus Decentralized Structure. Below the top-level stovepipe
structure shown in Figure 1.5, different collection INTs use different structures;
they are discussed in this book. In structuring an organization to collect, process,
analyze, and disseminate intelligence, the up-front question is this: Do you
create a centralized organization, a decentralized one, or some mix? In
answering that question, you have to consider the
• processing requirements.
Let’s look at them in turn, recognizing that the three are very much
interconnected.
• Identification of a signature
• Association of a signature with a person, feature, or object and identification
of changes in the state of the person, feature, or object (for example, by
geolocating him, her, or it)
It can be argued that the term MASINT covers this definition. But many
processes in what are traditionally called SIGINT and IMINT, in fact, involve
the measurement of an object or signal and the development of an identifying
signature. For example, imagery interpretation often involves both measurement
of objects in an image and identifying unique signatures of objects in an image.
such an agency, but the final chapter does focus on the substantial challenges of
managing collection across disciplines.
Part III explains how collection can be managed most effectively across
disciplines or stovepipes. It deals heavily with the front end—the planning,
requirements, and tasking phases. Much of the discussion focuses on the strategy
for collection, aiming to make intelligence collection as high as possible in the
chain of preferences described below.
The ideal collection strategy is clandestine. That is, the opponent never
knows that it happened. The reason is that if the opponent knows about it, then
the collection has less value. The opponent can take measures to minimize the
damage (e.g., by changing operational plans if he suspects that they have been
compromised) and to prevent future losses to the same collection effort. There
are numerous ways to collect clandestinely, and some of them are covered in this
book. You can make a collection device small and conceal it well. If it’s large
and must be mobile, you can disguise it, for example, in a plumbing service van
or a beer truck. If it flies, you can make it very stealthy and quiet.
Failing clandestine collection, the next best thing is for the opponent to be
uncertain just what was lost to the collector. The opponent might know that you
have agent penetrations or communications intercepts and what your imagers
can do. But he may not know where the penetrations are, which communications
links are being read, and what your imagery targets are. As much as possible,
you want to conceal the mission or purpose of the collection. Finally, in technical
collection, it may be that the fact of collection is known, but the capability of the
equipment (and what you’re getting from it) is unexpected. Having a technology
edge helps this.
Next in line of preference is that the collection is resistant to
counterintelligence (including destruction, capture, compromise, or denial and
deception) if the opponent knows what is being lost and how. A simple example
is the surveillance camera that is ubiquitous in banks and many stores. You may
know that it’s there, but your options for countering it are limited. Against a
well-configured set of surveillance cameras, you may be able to conceal your
identity but not your activity.
The least desirable case happens when the opponent knows what you are
collecting and can do something to counter it. Examples include knowing who
your agents are, which of his codes you have broken, where your cyber
collection has succeeded, what your imagery targets are, and what you’re
learning from the imagery. If you ever get to the worst case, you are set up to be
deceived and manipulated.
Summary
Intelligence collection divides broadly into two types. One type produces access
to human thought processes in the form of literal intelligence. One type
produces nonliteral intelligence based on the observations and measurements of
things. We can comprehend literal intelligence without need for special
assistance other than language translation. Nonliteral intelligence requires expert
processing and exploitation to make it understandable, and even then we often
require interpretation assistance from analysts who specialize in that collection
discipline.
Intelligence collection is best looked at from a systems point of view; that
is, by examining the function, process, and structure of the collection system.
NOTES
1. Michael Herman, Intelligence Services in the Information Age (New York: Frank Cass Publishers, 2001), 82.
2. Ibid.
3. An explanation of fusion centers and how they operate is in Robert M. Clark, Intelligence Analysis: A Target-Centric Approach, 4th ed. (Washington, DC: CQ Press, 2012).
4. JCS Joint Pub 2–0, “Joint Doctrine for Intelligence Support to Operations,” Chapter 3.
5. William M. Nolte, “Rethinking War and Intelligence,” in Rethinking the Principles of War, Anthony D. McIvor, ed. (Annapolis: Naval Institute Press, 2005), 423.
6. U.S. House of Representatives, Permanent Select Committee on Intelligence Staff Study, “IC21: The Intelligence Community in the 21st Century” (June 5, 1996).
2. Open Source Intelligence
Open source is a term used to describe material that is publicly available but is
used to produce intelligence. Open source information traditionally meant
published material—newspapers, books, and periodicals. As such it formerly
was referred to as literature intelligence (LITINT). The term LITINT fell into
disuse because it was too narrow; it did not include radio and television
broadcasts.
Today open source intelligence covers much more than traditional
published sources, and the term open source intelligence (OSINT) has become
the standard descriptor. It includes media such as newspapers, magazines, radio,
television, and computer-based information; professional and academic material
from conferences, symposia, professional associations, and academic papers;
government reports and official data; and user-generated Web content such as
social networking sites, video sharing sites, Twitter, wikis, and blogs.
Commercial databases hold vast economic data that are available for the price of
a subscription. All fit the open source category, though they are not published in
the traditional sense.
Open source collection is defined as the process of finding, selecting, and
acquiring information from publicly available sources; translating foreign
language material; and analyzing it to produce actionable intelligence. The
following sections describe the structure of open source organizations, their
sources, and the process of producing open source intelligence.
Function
Open source material is the dominant source of intelligence in volume, and
arguably in value as well. In the United States, it’s been estimated that 90
percent of what is needed to produce intelligence is found in open source. Its 1
chief value is that, compared with other literal sources such as human
intelligence (HUMINT) and communications intelligence (COMINT), it is
relatively easy to obtain. It also is valuable for customer organizations (e.g., law
enforcement) where lack of clearances constrain access to classified material.
Open source has two major roles in intelligence.
• Its most visible role is as the source for a finished intelligence product.
Open source is where the all-source analyst should start, because it’s so cheap to
get and easy to use. Analysts should not turn to more expensive collection
resources until exhausting the potential of OSINT. They should almost never ask
collectors to go after things that already are in open source. And they should
keep coming back to it as the expensive sources provide new leads. In practice,
this does not occur enough because of a perception issue, as discussed in the
next section.
• The second role is that of triggering collection or validating collection
by another INT such as COMINT or HUMINT; that role is discussed later in this
chapter.
Despite its value and the wide availability of open source, there continues to be a
debate within governments about open source as a legitimate collection INT.
Governmental intelligence, in the view of many, is about discovering secrets. As
a result, open source is not well perceived among all-source analysts, and this
perception problem hinders its effective use. In 1996, a congressional
commission created to study intelligence issues noted that vast amounts of open
source information had become readily available, but the intelligence community
had been slow in using it.2
much on secret information and use non-clandestine and public information too
little. Non-clandestine sources of information are critical to understanding
societal, cultural, and political trends, but they are underutilized.”
4
a clearance.
This bias against open source has received much criticism. It does have a
basis, though: the concept of competitive advantage. In both government and
commercial affairs, all players seek a competitive advantage over their
opponents. Open source, because it is available to all players, can’t provide that
competitive advantage. Secret information can do so, and both governmental and
competitive intelligence analysts prefer it for that reason.
7
The perception problem has led some clandestine services (though not, to
the author’s knowledge, the U.S. service) to report open source material as if it
had been collected by an agent. What has happened is that a case officer, pressed
to justify his value, created fictitious agents and provided open source material
as the agent’s reporting. The headquarters offices of some clandestine services
keep track of open source publications in their target countries, to ensure that
their HUMINT reporting does not duplicate open source reporting.
Any country having global interests must have current information about
possible opportunities or threats to its national interests worldwide. In
intelligence terms, it must maintain global coverage. And all countries have
regional concerns; they must maintain similar databases about nearby countries.
In intelligence terms, they must maintain regional coverage.
To address these needs, the U.S. intelligence community has developed
many variants on what is called a basic encyclopedia–which provides
intelligence on regions (ports, airfields, military bases, economic intelligence,
environmental intelligence, etc.). This intelligence, much of which is
unclassified, is also called a baseline. Following are two examples; both rely
primarily on open source intelligence, supplemented by classified sources:
as a regional coverage baseline for almost any country’s diplomatic, military, and
intelligence services.
Such baselines can be handled by open source and can be kept current by
staffers without security clearances. Alternatively, they can be quickly updated
when needed rather than being constantly maintained. For example, suppose a
country moves into a watch status (because it appears that a crisis is developing
there or customer interest has increased). An existing but outdated baseline can
quickly be updated with open source material and supplemented with classified
material.
Almost all finished intelligence products rely on open source—some more than
others. Following is a breakdown by the intelligence discipline. Even when a
government controls the media, the nuances (what is reported and what isn’t
reported) can provide valuable insights. That was true before the Internet; it’s
still true. Social networking adds a whole new dimension, as discussed later in
this chapter.
databases concerning international trade and national economies that have been
assembled by international organizations such as the United Nations. From these
and other sources, economic analysts compile statistics about many areas of the
economy: agricultural production, trade, raw materials, industrial output, and
energy, to name just a few. As with political reporting, small shifts in these
statistics can have great intelligence significance.
Economic analysts also depend on macroeconomic models to produce trend
assessments about economic sectors, and open source provides the primary
feedstock for these models.
The Soviet Union, during the Cold War, made extensive use of open source
economic reporting in an unusual way. Kremlin officials did not trust the official
reports they received about their own economy. They read carefully, and
sometimes acted on, assessments of their economy published in the West by
academics and by the CIA. In an interesting twist, the Kremlin’s subsequent
actions after the leadership read a CIA report obviated the report’s main
conclusion. The CIA report concluded that the Soviet petroleum industry was
facing a serious shortfall. Following the release of the CIA study, the Kremlin
directed a major shift in investment spending in favor of the oil and gas
industries. Soviet extraction and exploration increased significantly during the
late 1970s, and the shortfall never happened.11
Military organizations also publish their thinking about strategy and tactics
openly. Most military academies publish journals in which professors and
students share ideas about military affairs. And senior officers often write
articles or books on the same topics. In the 1970 movie Patton, General George
Patton reads a book on tactics written by his opponent, Field Marshal Erwin
Rommel. Patton, in the movie, uses the knowledge to defeat Rommel’s forces.
In the case of China, the problem isn’t lack of open source about military
developments. The Chinese produce great volumes of it. One problem lies in
figuring out which material deserves credibility—a topic we’ll return to later, in
a discussion of source analysis. A second problem is interpreting the material
correctly, as the following example illustrates.
The misreading or misinterpretation of open sources can have serious
national consequences. In 1965, Lin Biao, then the expected successor to
Chairman Mao Zedong, wrote a pamphlet asserting that the countryside of the
world (the developing countries) would defeat the cities (the advanced
countries). The U.S. leadership concluded that the pamphlet was a Chinese
blueprint for supporting subversion around the world, especially in Indochina.
That conclusion factored into President Lyndon Johnson’s decision to intervene
in Vietnam. A much later examination of the text indicated that Lin Biao actually
was arguing almost the opposite: that the conduct of a revolution was the
responsibility of the people in that country, to be carried out primarily through
their own efforts. Far from indicating a Chinese willingness to intervene, it set
limits on Chinese military support. 13
publications, and radio and television broadcasts to recruit and rally adherents to
their causes. The volume of relevant material is so great in the case of terrorists
that compendia of terrorism open source intelligence have been generated. The16
Law enforcement use of open source has increased markedly in the last two
decades. The rise in Internet-related crime has led to a corresponding rise in law
enforcement use of this open source to identify, track, and apprehend these
criminals:
OTHER USES
Providing Context and Validation. Open source is most valuable when used in
conjunction with classified intelligence. Much is learned by comparing
government pronouncements in the press to the information gleaned from
diplomatic exchanges and clandestine HUMINT. The same is true in the
competitive intelligence world. Insights into a company’s real plans and
intentions often come from comparing press releases to intelligence gained from
HUMINT.
Often, when an intelligence collector comes up with something of interest,
open source helps to fill in the gaps in knowledge. For example, suppose that
imagery has observed a ship at a pier, and the purpose, cargo, or destination of
the ship is of some intelligence interest. Open source information such as cargo
manifests, held by the maritime insurers at Lloyds of London, can provide
answers. Observations of massive population movement can be explained by
online postings, for example, Doctors Without Borders reports or UN
humanitarian reports.
Process
We’ll talk about the open source process as if it were linear. Like so much of the
intelligence business, it really isn’t. One jumps from step to step, sometimes
backward, sometimes forward. But in a linear order, the major steps are:
Let’s go through them in that order, recognizing that open source analysts
do jump around—sometimes, going back from the analysis step to locate more
material or validating while analyzing, for example.
Because of the vast amount of open source that is available, collection has to be
planned based on knowledge of what is of intelligence interest. Historically,
most open source material came in printed (hard) copy. Today, the most
commonly used sources are online. So let’s start with what has become the
dominant open source: the World Wide Web.
The World Wide Web. The Web has become, in a relatively short time, the
largest single repository of open source material. Almost any subject of
intelligence interest has extensive coverage on the Web. The quality of material
there, however, varies greatly. Much that is misleading or completely false
resides on the Web, and analysts must use Web sources with caution. But much
valid material also resides on the Web, and the commercial browsers and search
engines make searching the material comparatively easy. Overall, the Web has
become a useful source for many types of intelligence products.
The Internet as a communications medium falls in an ambiguous category;
is it open source, cyber collection, or COMINT? It could be treated as any one of
these. In describing the Web as open source, we’re talking about material that is
accessible with some kind of search engine or on a publicly accessible website.
Material that requires extraordinary means (e.g., hacking) to acquire, such as
emails, falls into the category of cyber collection. (See Chapter 5 for details.)
Online Databases. A wide variety of online databases can help in open source
research. The rapid expansion of global information networks provides analysts
with large volumes of organized information that were previously unavailable.
Most of these are now available through the World Wide Web, usually by paying
a fee for access. The number and availability of these commercial databases is
changing rapidly. Premium commercial sources originally included a few such as
Factiva, Lexis-Nexis, and Dialog. Today, there are many specialized databases
and even a few free general purpose databases such as Wikipedia.
Specialized databases offer some advantages in contrast to the general mass
of material available on the Web. They are usually organized by subject for
easier searching and often have been checked for validity. For example, one of
the more useful sources of technology information for both government and
competitive intelligence is in online patent databases. These have consistently
proven to be one of the most valuable sources of technology information. For
many organizations that perform classified research, patents are the only way to
publish their results openly. Jane’s (military hardware), Oxford Analytica, and
Lloyds of London (shipping) are other examples of specialized databases. There
are many others, with new ones popping up all the time. Efficient searches on
these may require a librarian or expert in the specialized search.
For material that is not on the Web or otherwise online, specific sources for
physical or electronic collection have to be identified. Following is a description
of some major sources.
Hard Copy Sources. As previously noted, the traditional open source was hard
copy material, primarily books, magazines, and newspapers. Though many of
these are now available online, some open source material still is not available
through the Web. Hard copy open source literature can be obtained from libraries
and from scientists and businesspeople who have frequent dealings with their
foreign counterparts. Some newspapers, telephone books, monographs, journals,
and technical literature are still available only in hard copy.
Radio and TV. During World War II, both the BBC and the Foreign Broadcast
Monitoring Service (the predecessor to the Foreign Broadcast Information
System [FBIS]) began monitoring German and Italian radio broadcasts. The
BBC effort started in 1939, when the British government asked the BBC to
translate and disseminate foreign journal and newspaper articles. Known as BBC
monitoring, the operation was set up in an old British mansion in Caversham,
near Reading, where it remains today. It collects publicly available material in
more than 100 languages, providing the results to civil servants, ministers, and
commercial clients. The BBC also reported radio broadcasting of intelligence
19
The British Secret Service set up a novel and very successful covert
operation that made use of BBC monitoring of German radio broadcasts during
World War II. A “black radio” station in the United Kingdom was staffed with
native German speakers (including anti-Nazi prisoner of war [POW] volunteers).
Purporting to be a German Wehrmacht station, it broadcast news for the troops.
Interspersed with actual news items were tidbits of distortions and gossip
designed to drive a wedge between the Wehrmacht and the Nazi party. The full
story is told in Sefton Delmer’s book, Black Boomerang. 21
After the war, BBC and FBIS monitoring was expanded to include
television broadcasts. TV broadcasts of foreign leaders’ speeches proved
particularly valuable, and not only for assessing the content. The video also gave
analysts an opportunity to assess the physical and mental health of world leaders,
a topic discussed in detail in Chapter 16.22
Gray Literature. The most useful hard copy documents are those limited-
distribution documents and papers known as gray literature. This term is applied
to limited edition publications that are not available through normal commercial
channels. Many research and manufacturing organizations publish controlled
reports or closed-circulation journals that contain sensitive or proprietary
information. Trade shows and conferences produce similar volumes of limited-
distribution literature in the form of papers or conference proceedings.
Some such journals are actually classified. Others are restricted access, so it
is a bit of a stretch to call them open source. As an example, back in the Cold
War days, U.S. analysts were aware that the Soviet military produced a classified
journal called Military Thought that contained valuable insights into the
leadership’s views on warfare. For the most part, analysts were unsuccessful in
obtaining copies. The Soviets tightly controlled the circulation of these and other
journals.
However, some sensitive journals may be found in public libraries or in
private collections due to errors in document control or distribution, and they can
often be obtained by clandestine collection (for example, by agents). For
example, an intelligence officer picked up a terrorist training manual that was
distributed at a public event in Southeast Asia. And some restricted circulation
23
such as the International Committee of the Red Cross and Doctors Without
Borders fall within this definition. They fall on the border between HUMINT
and open source.
Commercial imagery also could be considered to be open source. Large
volumes of imagery, for example, are becoming publicly available from
commercial imaging satellites. Some such imagery is available for free online,
and some is available for a fee. But commercial imagery is dealt with as imaging
intelligence in Chapters 9 and 10.
COLLECTION
As noted above, collection has two major steps: locate the good stuff, and
validate it.
Locate the Good Stuff. One of the myths about open source, noted in the
introduction, is that it’s readily available. It may be out there somewhere, but
finding the relevant and really good material can be very difficult. We’ve
discussed the challenge of finding gray literature. Social networking sites are
readily accessible, but finding the important ones in the great volume of such
sites can be a daunting task.
Ironically, one problem of open source intelligence is that it is so abundant;
an all-source analyst cannot possibly take advantage of all the available material.
In fact, such an analyst cannot even learn about all of the available ways to
obtain open source materials. Tracking the data sources is a full-time job. The
solution is to turn to experts on research. In governmental intelligence
organizations, the open source analyst can fill this role. For others, reference
librarians are skilled at finding hard copy materials worldwide and are especially
helpful on gray literature. They can help search and retrieve documents from
many different databases, including commercial databases. As these databases
become available worldwide, almost any country or commercial enterprise
should have an excellent research capability available to its analysts.
A persistent problem with online data sources remains this inability to
extract relevant information from the mass of data. The all-source analyst
inevitably encounters information overload. Both government and commercial
development projects continue to work toward the goal of creating a human-
computer team that would dramatically improve the capability of people to make
inferences in complex, data-intensive domains. Such a team would vastly
increase the ability to identify key facts hidden in immense quantities of
irrelevant information, to assemble large numbers of disparate facts to reach
valid conclusions, and to produce new patterns that assist in further analyses. We
can reasonably expect to see steady improvement in the problem of extracting
relevant information from the morass. For the present, though, the problem is
finding the really good stuff in the mass of available material.
26
For too long, open source searches have been delegated as just an additional
duty for all-source intelligence analysts. This seems to be a short-sighted
approach. No one would seriously propose that such analysts be required to
collect their own signals or imagery intelligence (though analysts sometimes do
so, in the case of commercial imagery). However, that is precisely what we do
with open source material.
Librarians and open source analysts can conduct searches far more
efficiently; it’s their specialty. They already know where the most useful sources
are located for a given issue. So they can focus quickly on a current intelligence
issue and go to the sources that will have the information needed. 27
But turning the search problem over to these specialists has its own risk of
missing relevant material. All-source analysts understand the subject of the
search and can spot nuances that would escape someone without their subject-
matter expertise. One compromise solution has been recommended—that
intelligence organizations develop a cadre of highly skilled open source analysts
and library professionals to work alongside all-source analysts in order to
provide tailored OSINT support to the analytical process. 28
Validate It. Validity was an easier issue to deal with pre-Internet when you
mostly were dealing with established sources for hard copy material. Even
electronic databases had a known and trusted source. But even back then,
reliability of the information could be a problem.
Today, the continuing problem of reliability, of sorting the true from the
false, increases the cost as much as anything. One has to vet the material and
analyze it very carefully. Open source is an excellent way for a hostile service to
plant misleading material. As noted previously, it’s also a good way to send a
signal, since it’s the only one that an opposing service is certain to receive (other
than diplomatic discussions). Some of the standard checks done in validation are
to look at the following:
Currency. Old material is not necessarily bad material; but, recently published
material is usually of more interest in intelligence. And in any event, it’s
important to establish a publication date on all material in order to evaluate its
significance.
Sponsorship. This will be an important thing to know in checking for bias during
the analysis phase.
Note that a failure to pass validity checks does not mean that the
information is useless. Even Web pages having questionable validity may have
intelligence value. Deception attempts, for example, may not pass validity
checks, but the fact that an attempt was made can tell you much about an
opponent’s intent.
PROCESSING
The Committee found that serious shortfalls persist for languages critical to
intelligence agency missions in spite of multiple past and ongoing efforts to
improve this capability. While IC agencies have attempted to correct their
hiring patterns and increase their language training programs, many still
rely heavily on contract linguists, interpreters, and translators for critical
languages. Persistent shortfalls in critical languages coupled with the
increasing volumes of information available through open source and other
means have exacerbated the effects of a national deficit in foreign language
capability on intelligence collection and analysis.
29
A country such as the United States has many residents with native
capability in difficult languages such as Arabic and Farsi. But typically these
residents were born in countries such as Iraq and Iran or have family living
abroad. For them, security clearances are difficult to get. This would seem to be
less of a problem for open source analysts than for COMINT analysts, as
discussed in Chapter 4. Open source is unclassified, after all. Even so, most
intelligence organizations would prefer not to reveal what material they are
translating, because it indicates an intelligence interest in specific subjects.
An intelligence service always has the option of turning to the services of
its allies for translation help. Where very large volumes of material need to be
translated, this may be the only feasible solution. The United States could, for
example, ask Kuwait or the United Arab Emirates to take on Arabic translations.
This doesn’t deal with the clearance issue, though. And it increases the risk that
the translation will contain some type of bias, as discussed next.
Source Bias. This was discussed earlier. Source bias is not a bad thing; in fact,
it’s good, so long as you know it exists and what the bias is. It helps you to
assess incoming information. Knowing the bias of a source helps put the
intelligence in perspective or provides insights into what a government or faction
is thinking.
• The extensive Chinese official press treatment of the Falun Gong movement
30
indicates much about the level of concern about the threat that the movement
presents to the government.
Translator Bias. We want the facts, but the opinions (of the source, not the
translator) also have intelligence significance. The trick is to capture the former
but not the latter opinions. Translator bias occurs both for translators who are
translating their native languages and for translators whose native language is
that of their parent service (e.g., English speakers in the United States and
United Kingdom).
The difficulty faced by translators for whom English is a second language is
this: they understand the nuances of their own language but may have a problem
expressing them in English. Furthermore, they often have personal opinions
about the message that they are translating, and those personal opinions can slip
into the result. It’s very hard for a native speaker to overcome a lifetime of
cultural inclinations and provide a truly neutral translation.
Translators whose native language is that of their parent organization often
have similar difficulties. They may understand the nuances of English, but they
can miss the subtle meanings contained within their second language. And their
personal views can slip into the translations as well. If you have to translate
some material, and the ideas in it are really repugnant or exactly the opposite of
your personal beliefs, you’re likely to have a tough time getting it right.
There are solutions to the translator bias problem, but they range from the
inadequate to the expensive. Software translation is an inexpensive way to
handle large volumes of material, but it’s inadequate. It doesn’t capture
subtleties. Some words or concepts simply don’t translate well from one
language to another. It’s not truly translator bias, but it has the same outcome.
Web-based translation software is widely used for translation, but it has the same
difficulties in identifying shades of meaning. The Web also contains traps for the
unwary, as noted earlier.
Having independent translations of the same material is a more costly way
to deal with translator bias. But you have to get translators who don’t have the
same bias. For example, having an al Qaeda sympathizer for one translator (if
you could get one), and an opponent for a duplicate translation, would be the
idea. Then you carefully examine the parts where the translations differ. A less
expensive alternative to independent translation is to have a peer review by a
separate translator. This is the same technique that all-source analysts use to help
avoid the bias trap.
An ancillary problem is organizational culture that (consciously or not)
encourages translator bias. The translation process has room for mischief, and
organizational mindset can cause that mischief. It usually manifests itself in the
form of translations that support policies of the translator’s parent organization.
• A 2005 U.S. government report entitled The Military Power of the People’s
Republic of China contained an assertion that China “plans to field” anti-
satellite systems. The report was based on translations of Chinese open
source writings. An independent review of the Chinese original text revealed
that the translation completely changed the meaning. The original article
simply recommended that China factor international arms control
developments into its response to military space competition. The translation
said that China will pay “close attention to progress made in military use of
space while actively developing anti-satellite systems,” a statement not found
in the original.
31
• For their part, Chinese translations of U.S. policy statements often reflect a
similar bias to support Chinese policy decisions. The Chinese especially are
prone to select and quote inflammatory statements made by U.S. officials,
even where the official is not in a policy-making position.
ANALYSIS
The most valuable part of a translation is often the open source analyst’s
commentary. A straight translation, without background or context, can be
misleading. The open source analyst can be a big help in providing this context;
after all, it’s the analyst’s primary job, and he or she typically has a solid
background in the target culture.
If a foreign news article or journal requires no translation (in the case of the
United States or United Kingdom, for example, it is written in English), it is
important to closely examine the motivations behind the publication. Japanese
news reports published in both Japanese and English often differ significantly,
and the Japanese version is likely to provide a more accurate picture. The
English version is likely to be toned down to make it more palatable to U.S.
readers.
The volume of publication on a topic can be an indicator of many things.
For commercial firms, it can indicate interest in a technology or concept.
Patents, for example, are not always published to protect an invention;
sometimes, they are intended to scare the competition or to establish the
patentee’s professional credentials.
Governments often use volume to sell a message and especially to convey a
propaganda message to their people. Repetition of a message can increase its
acceptance. Continuing an example cited previously, Chinese government-
controlled publications initially orchestrated a campaign against Falun Gong that
alleged that the movement was antiprogress and antiscience. When this approach
failed to take hold, they switched to other frequently repeated messages: that
Falun Gong was in collusion with foreign, anti-China, forces; and that adherents
practiced self-immolation. The open source analyst following this trend should
note it explicitly in commentary rather than simply translating and reporting.
The purpose of open source analysis, then, is to place the material in
context. Two methods of doing this are source analysis and content analysis.
Source Analysis. Source analysis is done to some extent in the validation part of
the process. This step involves a thorough assessment of the source’s
qualifications, official position, and influence. As in other areas of intelligence,
the general rule for open source is this: What is said is not as important as who
said it. Statements by a head of government typically carry more weight than do
those of a head of state. A finance minister’s statements on budgetary issues
carry more weight than do the same statements made by a minister of the
interior.
Open source reporting on China provides a compelling example of the need
for source analysis. China publishes volumes of material on national security and
military affairs. Chinese websites containing sensational claims about weapons
have in the past been used as sources to show both capability and intent to take
on the West (the United States, especially) militarily. Unless one carefully
assesses the source, it is possible to prove almost any point that one wishes to
make about China’s foreign policy, military capability, or intent. U.S.
government analyses of Chinese policies especially have been based on selected
quotations of Chinese authors, with the implication that they are influential, but
the analyses often fail to provide evidence that they are.32
• What are the antecedents of an article? What does the article tell you about
the source? For example, is the source what it is claimed to be? (The Black
Boomerang radio broadcasts, described earlier, derived much of their
effectiveness from the broadcaster’s claim to be a German Army radio
station.)
• Does the article deviate from a standard pattern for that culture? If so, why?
Some of these questions, obviously, spill over into the realm of the
allsource analyst. But the open source analyst often possesses unique insights. A
prime example of an open source analyst’s value occurred during the Cuban
Missile Crisis in 1963. A BBC analyst identified a subtle offer by Soviet leader
Nikita Khrushchev to end the crisis peacefully during a Radio Moscow
broadcast (an example of the use of open source for signaling). The offer was
34
DISSEMINATE
source does not mean that it is declassified. Some governments— China, for
example—try to counter embarrassing revelations with their own press releases.
Others prefer to ignore the offending material. U.S. government employees and
their contractors are cautioned to neither confirm nor deny items that appear in
the open media.
Most dissemination is to end users (customers) and to all-source analysts.
But some dissemination is designed to support other collection INTs. Tip-off is a
term used by collectors for the process of alerting other parts of an intelligence
community about a time-sensitive collection opportunity. Open source frequently
provides tip-off, especially to COMINT and HUMINT collectors. Sources of
such tip-off include news services and private observers who post messages and
photographs about what they have observed. This is an invaluable source for
directing collection on fast-developing events, such as the Mideast unrest during
early 2011. Obviously, these sources can be misleading or slanted; part of the
skill of the open source analyst is explaining the context and describing any bias.
Targeting is similar to tip-off in nature, but it is usually longer term and more
deliberate. It includes identifying people and organizations for COMINT and
HUMINT targeting and locations for IMINT targeting. The social networking
sites—blogs, Facebook, LinkedIn, and similar sites—provide a rich set of
material that can be used for targeting. And even if the collector cannot get to a
key person directly via social networks, it may be possible to reach the target
indirectly through friends or associates who network.
Structure
Open source differs from the other collection INTs in two ways.
• First, anyone can do it. It’s been done commercially for years. Small
intelligence services, terrorists, and commercial entities all have easy access and
make use of it. Open source is readily available to terrorist groups, and we know
from their writings that terrorists rely heavily on it. It’s the equalizer that allows
small intelligence services to compete with the big guys.
• Second, the product needs no special protection. Dissemination, though,
can run into copyright issues. And open source translations can reveal an
intelligence service’s interest in specific topics that the service would rather not
disclose.
These two differences shape the way open source organizations are
structured and operated. Until the mid-1990s, the structure for open source
intelligence was stable. Governments collected and translated foreign media:
newspapers, journals, and radio and television broadcasts from target nations.
The target media had long track records. The volume and credibility of
information in these media were relatively predictable.
In the United States, much of this open source was collected and
disseminated by the FBIS. As previously noted, FBIS originated as the Foreign
Broadcast Monitoring Service just prior to World War II. It subsequently became
an open source intelligence component of the Central Intelligence Agency’s
Directorate of Science and Technology. It monitored, translated, and
disseminated within the U.S. government openly available news and information
from media sources outside the United States. It maintained a number of
monitoring stations at locations around the world.
To complement the FBIS effort, several intelligence agencies (including the
National Security Agency [NSA], the Defense Intelligence Agency [DIA], and
the military service intelligence agencies) over the years have maintained their
own separate groups for acquiring and translating open source material that
addresses their specific interests. In the United Kingdom, the BBC has a long
history of open source collection, filling a role similar to that of FBIS. Many
other countries followed suit during the Cold War. East Germany’s intelligence
organization, the Ministry for State Security, analyzed 1,000 Western magazines
and 100 books a month and summarized more than 100 newspapers and 12
hours of West German radio and TV broadcasting daily. 36
Much has changed since the 1990s. During that time, globalization and the
increasing need for government, NGOs, and commercial firms to acquire
information across the globe has fueled an industry. Today many firms provide
worldwide open source information, forming what has been called a “private-
sector intelligence community.” Four such firms are U.S. companies Stratfor and
Intellibridge and U.K. companies Jane’s Information Group and Oxford
Analytica. In addition, many firms provide very specialized open source
37
Decentralized arrangements work so well that open source can be, in effect,
a cottage business. Any country, business, or NGO can set up an open source
collection and analysis center. It’s very inexpensive in comparison with all other
collection INTs, making it a great equalizer among intelligence services, NGOs,
and international corporations.
Summary
Open source material is perhaps the most widely used source of intelligence;
certainly most intelligence production is based on it. Political and economic
intelligence rely heavily on open source, as do scientific, technical, and
environmental intelligence. Military intelligence does also, especially in
combating terrorism and in developing intelligence about what the military calls
“human terrain.” Law enforcement makes increasing use of open source—the
Internet—in combating Internet crime and apprehending sexual predators and
stalkers. Being inexpensive and unclassified and requiring no special protection,
open source is useful for sharing in coalition operations and for steering
classified collection.
Despite its value and its wide use, some writers question whether open
source is a legitimate collection INT. As a result, open source suffers from a
perception problem among all-source analysts, and the perception problem leads
to its misuse (or nonuse). It is often overlooked by government intelligence
organizations in favor of classified information. The perception and use problem
derives in part from the perception that open source provides no competitive
advantage, since anyone can do it.
Open source information has traditionally meant published material that is
publicly available—newspapers, books, and magazines. The World Wide Web,
including online databases, is the dominant source today. But much valuable
material still is available only in hard copy (some newspapers, books, and
magazines). Radio and television broadcasts have been a useful intelligence
source since World War II, and remain so. Gray literature—material that is
unclassified but not widely available—also continues to be important.
The open source process typically has 5 phases:
1. Plan and identify sources. The up-front challenge is to find the really
good items in the mass of available material. Often it is necessary to rely on
search specialists.
2. Locate the good stuff and validate it. One has to vet the material and
analyze it very carefully. Open source is an excellent way for a hostile service to
plant misleading material. Validation requires looking at accuracy, credibility,
and authenticity of the material, checking how current it is, and identifying the
sponsors.
3. Translate. Most sources have some bias, and it is important to know what
that is. But sometimes the translators or their parent organizations also have a
bias that distorts the meaning of the translation.
4. Analyze. Provide commentary on the source’s bias, and motivation for
providing the material. Place the material in context via source analysis or
content analysis. What is said is not as important as who said it. Content analysis
is a pattern research tool that identifies significant deviations from past
publications or finds subtle messages in the material.
5. Disseminate. Open source has a very large customer set, and the material
has to be made available and searchable. This can be done either by push—
sending selected translations to specific customers; or by pull— making all the
material available for customers to search and retrieve the items of interest.
NOTES
1. Susan B. Glaser, “Probing Galaxies of Data for Nuggets,” Washington Post (November 25, 2005), A35.
2. Commission on the Roles and Capabilities of the United States Intelligence Community (1996), Chapter 8, accessed 21 September 2012 at http://www.gpoaccess.gov/int/int012.pdf.
3. “Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction,” March 31, 2005, p. 13, accessed 24 September 2012 at
http://www.gpo.gov/fdsys/pkg/GPO-WMD/content-detail.html.
4. Ibid.
5. Susan B. Glaser, “Probing Galaxies of Data for Nuggets,” Washington Post, (November 25, 2005), A35.
6. Rob Johnson, Analytic Culture in the US Intelligence Community, Center for the Study of Intelligence (CIA, Washington, DC, 2005), 24.
7. William M. Nolte, “Rethinking War and Intelligence,” in Rethinking the Principles of War, Anthony D. McIvor, ed. (Naval Institute Press, Annapolis, 2005), 432.
8. The World Factbook is accessible at https://www.cia.gov/library/publications/the-world-factbook/.
9. Glasser, “Probing Galaxies of Data for Nuggets,” A35.
10. Daniel Patrick Moynihan, Secrecy: The American Experience (New Haven, CT: Yale University Press, 1998), 227.
11. James Noren, “CIA’s Analysis of the Soviet Economy,” Chapter 2 in “Watching the Bear: Essays on CIA’s Analysis of the Soviet Union” (CIA Center for the Study of Intelligence,
2001), accessed 21 September 2012 at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/watching-the-bear-essays-on-cias-analysis-of-
the-soviet-union/article02.html.
12. Walter Laqueur, The Uses and Limits of Intelligence (Somerset, NJ: Transaction Publishers, 1993), 43.
13. Henry Kissinger, On China (New York: Penguin Press, 2011), 105.
14. Lt. Col. Jack Marr et al., “Human Terrain Mapping: A Critical First Step in Winning the COIN Fight,” Military Review (March–April 2008), 18–24.
15. Glasser, “Probing Galaxies of Data for Nuggets,” A35.
16. See, for example, the “Terrorism Open Source Intelligence Reports,” formerly published weekly for the US military by Interaction Systems Incorporated.
17. Cahal Milmo, “After 70 Years Monitoring the Airwaves, BBC Listening Post Could Be Cut Off,” The Independent (July 13, 2010), accessed 3 March 2012 at
http://www.independent.co.uk/news/media/tv-radio/after-70-years-monitoringthe-airwaves-bbc-listening-post-could-be-cut-off-2025090.html.
18. “Cyber collection” as used here does not include normal Web-based research. Chapter 5 provides a definition of cyber collection.
19. Cahal Milmo, “After 70 Years Monitoring the Airwaves, BBC Listening Post Could Be Cut Off.”
20. “OSINT Report 3/2010,” International Relations and Security Network, ETH Zurich (October 2010), accessed 21 September 2012 at http://www.isn.ethz.ch/isn/Digital-Library/ISN-
Insights/Detail?lng=en&ots627=fce62fe0–528d-4884–9cdf-283c282cf0b2&id=122008.
21. Sefton Delmer, Black Boomerang (New York: Viking Press, 1962).
22. Gary Thomas, “Spies Track Physical Illnesses of Foreign Leaders” (September 20, 2011), Voice of America, accessed 21 September 2012 at
http://www.voanews.com/english/news/usa/Spies-Track-Physical-Illnesses-of-Foreign-Leaders-130222673.html.
23. Peter Eisler, “Today’s Spies Find Secrets in Plain Sight,” USA Today (April 1, 2008), accessed 21 September 2012 at
http://www.usatoday.comhttp://www.usatoday.com/tech/news/surveillance/2008-03-31-internet-spies_N.htm.
24. Private conversation with CIA senior analyst Norman Davis, 1973.
25. “NATO Open Source Intelligence Handbook” (November 2001), p. 9, accessed 21 September 2012 at
http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%200SINT%20Handbook%20v1.2%20-%20Jan%202002.pdf.
26. Glasser, “Probing Galaxies of Data for Nuggets,” A35.
27. “NATO Open Source Intelligence Handbook” (November 2001), 19.
28. Eliot A. Jardines, Testimony before the House Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment (June 21, 2005).
29. United States Senate, “Report of the Select Committee on Intelligence, United States Senate, covering the period January 3, 2009 to January 4, 2011.” U.S. Government Printing Office
(March 17, 2011), p. 26, accessed 21 September 2012 at http://www.intelligence.senate.gov/pdfs/1123.pdf.
30. Falun Gong is a spiritual discipline first introduced in China in 1992 that combines meditation, exercises, and moral philosophy. The Chinese government considers it a threat to the
regime; it has suppressed the movement, imprisoning and torturing Falun Gong members.
31. Gregory Kulacki and David Wright, “An Analysis of the March 2005 Report by the U.S. National Air and Space Intelligence Center,” Union of Concerned Scientists, 15 September
2005, accessed 21 September 2012 at http://www.ucsusa.org/assets/documents/nwgs/nasic-analysis-final-9-15-05.pdf.
32. Gregory Kulacki, “Statement Following China’s January 2007 Anti-Satellite Test,” Union of Concerned Scientists (February 2007), accessed 21 September 2012 at
http://www.ucsusa.org/assets/documents/nwgs/kulacki-on-chinese-asattest.pdf.
33. Chen Yali and Eric Hagt, “China Book Shelf,” ChinaSecurity, #2 (2006), accessed 21 September 2012 at http://www.chinasecurity.us/index.php?
option=com_content&view=article&id=253&Itemid=8.
34. Cahal Milmo, “After 70 Years Monitoring the Airwaves, BBC Listening Post Could Be Cut Off.”
35. Glasser, “Probing Galaxies of Data for Nuggets,” A35.
36. “OSINT Report 3/2010.”
37. CIA, “Are You Ready?” (Global Futures Partnership, July 2001), accessed 21 September 2012 at
http://www.oss.net/dynamaster/file_archive/090916/6e2588a3d13c9db47d49d9c23b464d79/Are%20You%20Ready.pdf.
3. Human Intelligence
This chapter is about the use of human sources for collection. The term human
intelligence (HUMINT) is used both to describe intelligence that is collected by
human sources and to describe the process of collection. It is frequently done by
governments, but a massive amount of HUMINT worldwide is collected by
nongovernmental organizations (NGOs) and commercial entities.
Function
HUMINT is concerned with gathering information from people on domestic or
foreign topics of intelligence concern. Following is a summary of the HUMINT
function for some key mission areas or intelligence disciplines.
MILITARY SUPPORT
• Sir Francis Walsingham’s spy network provided him with details about
the plans, readiness, and capabilities of the Spanish Armada that helped the
English fleet to defeat it in 1588. Information provided by one spy, Anthony
Standen, allowed the English to know exactly when the Armada would arrive.
• Prior to World War I, Austria-Hungary’s chief of counterespionage,
Colonel Alfred Redl, was recruited by Russian intelligence and provided them
the Austrian invasion plan for Serbia. The Russians shared the information with
Serbia’s military command, so that the Serbians were well prepared for the
invasion. In addition to providing Austria’s military secrets to Russia, Redl
provided the Austrian military with erroneous information about Russian
military strength and disclosed the identities of Austrian agents in Russia.
1
The Soviets had their HUMINT successes during the Cold War, as well.
According to Paul Redmond, “four spy cases alone could have given the Soviet
Union a decisive advantage if war had broken out”:
• the Walker spy ring provided the KGB with a capability to read the U.S.
Navy’s encrypted communications;
• the Clyde Conrad spy ring provided details of the U.S. Army’s
operational plans and communications in Western Europe;
• Robert Hanssen passed to the Soviets U.S. plans for allowing the
government to survive a nuclear attack; and
• Aldrich Ames compromised CIA’s human sources working in the Soviet
Union during the mid-1980s. 2
• The 2011 raid on Osama bin Laden’s compound that resulted in his
death was preceded by extensive HUMINT operations and technical
surveillance. The HUMINT involved interrogation of al Qaeda prisoners at
Guantanamo Bay, surveillance of bin Laden’s courier, and renting a safe house
near the Abbottabad compound. This HUMINT led to extensive imagery of the
compound provided by the National Geospatial-Intelligence Agency (NGA),
along with other technical surveillance measures. 5
LAW ENFORCEMENT
HUMINT remains one of the primary collection methods used by law
enforcement. The FBI and state law enforcement used human sources
(informers) for years to great effect against the American Mafia. More recently,
6
human sources have been invaluable in the war on drugs and against domestic
terrorists. Many such sources are not recruited agents but volunteers.
The topic of deception and signaling was introduced in Chapter 2. Signals often
are conveyed via HUMINT.
Recognizing and interpreting an opponent’s signals is one of the more
difficult challenges that HUMINT collectors must face. Depending on the
situation, signals can be made verbally, by actions or by displays, or by very
subtle nuances that depend on the context of the signal.
In negotiations, signals can be both verbal and nonverbal. True signals often
are used in place of open declarations, to provide information while preserving
the right of deniability. False signals are used to mislead, usually to gain a
negotiating advantage.
Signaling between members of the same culture can be subtle, with high
success rates of the signal being understood. Two U.S. corporate executives can
signal to each other with confidence; they both understand the rules. A U.S.
executive and an Indonesian executive would face far greater risks of
misunderstanding each other’s signals. The cultural differences in signaling can
be substantial. Cultures differ in their reliance on verbal and nonverbal signals to
communicate their messages.
COMMERCIAL HUMINT
targeting technologies where the others had an advantage. The defense often
took the form of keeping their employees narrowly focused on a single part of
any major process such as steelmaking or industrial chemicals. No one person
could give away the whole process. 8
The Soviet Union later refined this technique. Within Soviet military
industries, no single émigré, defector, or spy—unless he was a top level
executive—knew very much of the overall picture. Everything was as
compartmented as the Soviet system could make it. This system made for great
security against HUMINT but at a high price in thwarting adaptability and
knowledge sharing among those who needed the information.
HUMINT today is a major source of intelligence information for many
commercial organizations, and many governments also use HUMINT for
commercial purposes. The challenge for commercial organizations is to collect
HUMINT without violating legal or ethical constraints. Most corporations do not
use clandestine HUMINT (for example, agents in the employ of their
competitors) for ethical reasons. Even where ethics do not constrain
corporations, the companies usually try to avoid clandestine HUMINT because
of the costs associated with exposure. Two examples illustrate the exposure
hazards of clandestine commercial HUMINT:
developed commercial espionage into a fine art. The Chinese Ministry of State
Security co-opts some of the thousands of students, tourists, business travelers,
trade delegations, and scientists who visit the United States and European
countries every year. France, in fact, has been both the beneficiary of its
espionage against the United States and the victim of espionage by China.
French businessmen have fallen prey to entrapments based on compromise,
materials theft, false tenders for procurement, and bribes by the Chinese.
12
prevalence of important targets that are networks. Many of these new targets are
ethnic/family/clan-based organizations that are especially difficult to penetrate.
The U.S. and Commonwealth services must deal with more language and
cultural diversity than in the past. They have to staff, train, and equip for many
more problem areas than in the Cold War arena.
So the target is constantly changing, and it’s difficult for HUMINT to keep
up. HUMINT lacks the targeting flexibility that other INTs possess—it is
constrained by the source’s knowledge and access. It is much more
opportunistic. Some of the best sources have been walk-ins. A major shift in the
last two decades has been from state to nonstate targets. But HUMINT resources
cannot simply be redirected. For these reasons, a surge capability is difficult for
HUMINT to create.
At the same time, this new target set has given clandestine services an
increasingly important role: that of the enabler of other kinds of collection.
Because a clandestine service is present in a target country and knows how to
operate there, it can enable many other INTs. COMINT, cyber collection,
electronic intelligence (ELINT), foreign instrumentation signals intelligence
(FISINT), materials sampling, and acoustic monitoring are examples of
collection that can be undertaken with the assistance of a clandestine service.
Process
This section is about tradecraft—the techniques that are used to acquire
HUMINT, clandestinely or overtly. Clandestine tradecraft is about recruiting and
developing good sources and running them effectively. It also includes some
more aggressive techniques, such as surreptitious entry to steal files and ciphers.
As noted earlier, human intelligence divides broadly into the two categories
of clandestine and overt HUMINT. The two have quite different processes.
Clandestine HUMINT operations require a large and complex infrastructure
from which to operate, including overseas offices, safe houses, cover legends,
and specialized training. In the United States the CIA has been the dominant
source of clandestine HUMINT. The U.S. military services also collect
HUMINT clandestinely but mostly they do overt collection. HUMINT collection
in the competitive intelligence world is largely overt.
The following subsections outline the major HUMINT sources, starting
with the familiar clandestine sources but including émigrés, defectors,
elicitation, and interrogation sources. The common theme of these sources is that
the intelligence is collected by one person interacting with another person to
obtain information.
The products of governmental HUMINT activities include embassy
officers’ assessments, information elicited from contacts, information from paid
agents, or documents or equipment clandestinely acquired by purchase or theft.
The human sources can be diplomats and defense attachés, international
conference attendees, defectors, émigrés, or refugees. (An attaché is a technical
expert on the diplomatic staff of his or her country in a foreign capital. An
émigré is a person who has permanently left his home country, usually for
political or economic reasons.)
Volunteers—cooperating private individuals and organizations—also can
supply privileged information that they encounter in the course of their work.
Nongovernmental organizations have proliferated in recent years and are
increasingly useful sources about foreign developments.
CLANDESTINE COLLECTION
Spotting. Spotting is all about identifying a potential agent. The usual approach
is to observe government officials stationed abroad, looking for evidence that an
official is dissatisfied with his country or personal situation, or that he or she
might be willing to spy for some other reason. Split loyalties and narcissism,
poor parental relationships, a failed marriage, infidelity, or substance abuse all
indicate a potential vulnerability to recruitment. Potential agents also may be
recommended by prior walk-ins who knew them and believed that they were
susceptible to recruitment. 14
• be willing to spy. Agents acting under duress will want to end the espionage
relationship and are likely to lie to the case officer;
Assessing. Some agents go through the full recruitment process. Some bypass
the spotting step; these are the walk-ins—someone who simply shows up (often
at a country’s overseas embassy) and volunteers to spy. Many of the most
successful spies on both sides of the Cold War were walkins. The United States
benefited from walk-ins such as Oleg Penkovsky, Ryszard Kuklinski, and Adolf
Tolkachev. The Soviets were at least as successful, acquiring walk-ins such as
John Walker, Aldrich Ames, and Robert Hanssen.
Whether active recruitment or walk-in, each potential agent has to be
assessed; how well does he or she stack up against the characteristics described
above? And what motivates the agent? Assessing motivation is very important in
being able to interact effectively with an agent. Motivation to spy varies among
individuals. The acronym MICE (money, ideology, compromise, ego) has been
used as a shortcut to classify a potential agent’s motivation, though revenge is
often a fifth factor.
Money has been the key motivator for American spies. James Olson,
former CIA counterintelligence official, notes that “Americans betrayed their
country for many reasons, mostly for money.” Walker, Ames, and Hanssen
15
organization.
Recruiting. After a completed and favorable assessment, the case officer has to
make the pitch to the potential agent. Success here depends on the skill of the
case officer. The case officer tries to present an attractive offer that is based on
the candidate agent’s perceived motivations. He may promise assistance to the
candidate in doing something the candidate wants but cannot accomplish
himself. The recruitment package might involve obtaining specialized medical
treatment for a family member, assistance in obtaining a Western education for
children, or money needed for some purpose, such as to purchase a home.
Some recruitments take a long time. Many fail for a variety of reasons—the
candidate may simply be opposed to spying, he may want something that can’t
be provided, or he may impose conditions that are dangerous for the case officer.
Some nations use a “false flag” in recruiting an agent. That is, the case
officer represents himself as belonging to one organization but, in fact, belongs
to another. Israel’s foreign intelligence agency, Mossad, is known for using false
flag recruitments of Arab spies. Most Arabs are unwilling to spy for Israel, but
many are willing to spy for what they believe to be another Arab country or
organization.
Coercion and bribery are other tools of the trade used mostly against the
West. The bribery can be subtle. One commentator has observed that “the typical
Chinese way is, you help the Chinese, they help you to develop an export
business to sell cheap salad bowls to Kmart.” 20
people to spy against their countries. But a coerced agent usually is not a good
one. He fails the first characteristic of a good agent: willingness to spy. Clayton
Lonetree, a Marine guard at the U.S. Embassy in Moscow, was caught in an
illicit love affair with a KGB-controlled girlfriend and then coerced into spying
for the Soviets. Lonetree eventually turned himself in, consumed with guilt. 22
Vetting. After a successful recruitment, the next step is to vet the new agent.
Vetting primarily is concerned with testing the agent’s veracity, for example,
spotting dangles. The United States relies on the polygraph in questioning agents
about lifestyle, contacts, access to information, and past history, searching for
signs of deception in the responses. Many other countries use techniques that
predate the polygraph for vetting.
Running the Agent. After the recruitment process is complete, and the new
agent is on board, it is time to reap the reward of all that effort. The agent must
be provided guidance on what to collect, and the collected material must be
communicated back to headquarters, assessed, and reported. Some agents know
what is likely to be important to their new masters. One reason that intelligence
officers make such good agents is that they usually have a good idea of what is
needed. Another reason is that they have some idea of what tradecraft to
practice. But almost all agents need some training, especially on conduct of
meetings and other communications with their case officers.
The primary challenge, once the training phase is complete, is to maintain
secure two-way communication between the agent and the handler. Since the
beginning of spy activity, spies have had to communicate their information back
to their handlers and to do so clandestinely. The case officer needs to provide
instructions to the agent, and the agent needs to provide information (raw
intelligence) to the case officer. This can sometimes be done in clandestine
meetings between the two, for example, in a bar or on a park bench. Face-to-face
meetings are often risky but are essential for assessing, training, resolving issues
and problems, making sure that requirements are understood, and changing plans
or targets.
Face-to-face meetings are especially risky in countries with sophisticated
counterintelligence or security services, for example in countries such as Russia,
China, and Iran, so indirect contacts are often the best means of communication.
An important job of any counterespionage team is to identify agent
communications, whether direct or indirect.
It has been noted that agents are “most vulnerable to being caught not while
procuring the information, but when attempting to pass their secrets to a third
party.” The successes in security surveillance by the KGB’s 7th Directorate in
23
Traditional techniques such as brush passes and dead drops have been
supplemented by a number of methods that rely on modern communications
technology. These methods collectively are referred to as covert
communications, or “COVCOM” in the United States.
One of the oldest techniques for covert communication is steganography,
or secret writing. The traditional approach is to write a message in invisible ink
between the visible lines of an apparently innocuous letter. Counterespionage
routinely relies on opening suspect correspondence (known in the trade as a
“flaps and seals” operation) and testing for secret writing. So secret writing is
not commonly used by sophisticated intelligence services. It still finds use in
countries where technical methods of communication are not available. During
World War II, agents used a sophisticated type of steganography called the
microdot: a technique of photographing and reducing a page of text to the size of
a pinhead, then making it look like the period at the end of a sentence.
Modern steganography, as discussed in the COMINT chapter, makes use of
computer technology. The rise of the Internet has provided many new
opportunities for clandestine communications using, for example, Internet cafes.
It also has given rise to new types of steganography. In digital steganography,
electronic communications place steganographic coding inside of a document
file, image file, or program. Media files are ideal for steganographic
transmission because of their large size. As a simple example, a sender might
start with an innocuous image file and adjust the color of every 100th pixel to
correspond to a letter in the alphabet, a change so subtle that someone not
specifically looking for it is unlikely to notice it.
Radio provides agents and their handlers with a means of rapid remote
communication, sometimes over great distances. In the mid-20th century, high
frequency (HF) radio was widely used for agent communications because it
could span continents. But radio communications can be intercepted. Several
techniques are used to avoid interception. One of the more popular is to send
compressed messages in very brief transmissions (known as burst
transmissions). Agents also use what are called “low probability of intercept”
communications. These include spread spectrum (using a signal that looks like
noise to normal receivers) and frequency hopping (moving rapidly from place to
place in the radio frequency spectrum to dodge intercept receivers).
In the latter half of the 20th century, many agent communications moved to
satellites and cell phones. Satellites provide a more secure means for agents to
communicate intelligence and receive instructions. Reportedly, CIA in the 1960s
used communications relay satellites, codenamed BIRDBOOK, in low earth
orbit to maintain covert communications with agents. However, a disadvantage
of such low orbits is that the satellite is in view for only a few minutes during a
given pass over an agent’s location.26
Exit Strategy. Relationships don’t last indefinitely, and the relationship with a
human source eventually will end. Sometimes the source’s value has diminished
or ended. The source’s access may have been lost, or the information that he or
she can provide is no longer important enough. Perhaps the source no longer is
reliable (or perhaps he or she never was). If a clandestine source doesn’t die
naturally and isn’t caught, at some point he or she will need to be retired. The
ending of this relationship often is painful for both the source and the handler
because of the emotional relationship that develops over time.
Sometimes the source continues to have value, but the risks of being caught
have become too great. In such cases, the source usually must be exfiltrated
(removed from his native country to a place of safety). Some clandestine
services are willing to cut ties with the agent in such cases, but most feel an
ethical obligation to extract the agent (along with close family members, if
possible) from a dangerous situation. Israeli intelligence, for example, has a
history of exfiltrating former agents and collaborators and resettling them in
Israel. In 2000, as Israel ended its long occupation of southern Lebanon, it pulled
a large number of its Lebanese agents out of Lebanon and resettled them. 28
The story has been told in books, a TV movie, and the 2012 movie Argo.
Cover. HUMINT operatives must travel to foreign countries, and in most cases,
they cannot function effectively if their profession is known to the host country.
Clandestine services officers, in particular, must conceal their actual role. Some
form of cover (e.g., assumed identity) is needed.
There are two types of cover—official and nonofficial. Persons under
official cover work in official government positions. The deepest level of cover
is nonofficial cover. Such operatives are called NOCs. NOCs are much more
difficult for a counterintelligence service to identify but much more vulnerable if
identified.
The Soviet Union probably has made the most aggressive use of nonofficial
cover, relying on a variant form called an “illegal.” An illegal has a false identity
and legend. Illegals are selected at a young age and trained extensively before
assuming their new identity, usually of a young person who has died without
surviving family. They may then be sent abroad, often for many years, even
decades, before beginning their espionage careers. Soviet illegals of note include
Rudolf Abel (real name: Vilyam Genrikhovich Fisher), who supported the
atomic bomb spies in the United States and was caught in 1957, and Gordon
Lonsdale (real name: Colon Trofimovich Molody), arrested in the United
Kingdom in 1961. Since the collapse of the Soviet Union, Russia has continued
to use illegals, though apparently with less success than in the early days of the
Cold War. On June 27, 2010, the FBI arrested 11 illegals who had assumed false
names and backgrounds—in one case stealing the identity of a dead Canadian.
The 11 appear not to have been very successful spies and were exchanged for
prisoners held in Russia.30
The types of cover used by NOCs vary broadly. Fisher ran a photography
studio in New York. Molody’s cover was as a jukebox salesman. The 11 Russian
illegals arrested in 2010 had such diverse covers as journalists, realtors, a think
tank staffer, a financial services representative, an accountant, a travel agent, and
a software tester.
Both the CIA and the British SIS (MI-6), among others, make use of
NOCs. 31
All forms of overseas cover are increasingly a problem for all clandestine
services. The increased availability of life history data to foreign governments
and increasing worldwide availability of technologies such as biometrics
exacerbate the cover problem. Crossing borders has become a particularly
hazardous event for the undercover officer. With the advent of biometric
information, false documents are easier to discover. Furthermore, the ability to
investigate the background of a suspicious person has grown rapidly with the
Internet. In fact, a person without a cyber footprint is treated with suspicion.
As a result, nonofficial cover is becoming both more necessary and more
difficult to maintain, and new types of NOCs have to be created. Nontraditional
platforms for agent recruitment also are increasingly necessary, and these cost
more to maintain than official cover platforms.
32
Espionage Cover. The Amtorg Trading Corporation was founded in 1924 by the
Soviet Union. An American company based in New York, it served as a buying
and selling organization in trade between the Soviet Union and the United States
until the 1930s. It also provided a convenient cover for a number of Soviet
espionage agents.
Covert Operations Support. One of the better known cover businesses, known in
the trade as “proprietaries,” was Air America: In August 1950, the CIA secretly
purchased the assets of Civil Air Transport, an airline that was started in China
after World War II by General Claire L. Chennault and Whiting Willauer. Later
renamed as Air America, the airline continued to fly commercial routes
throughout Asia, acting in every way as a privately owned commercial airline.
At the same time, it provided airplanes and crews for secret intelligence
operations.33
Technology and Materiel Acquisition. Many intelligence agencies use the cover
of front companies and co-opted businesses for technology and materiel
acquisition. Countries such as Russia and China have a long history of targeting
Western Europe, the United States, and Japan in particular because of the
advanced technology that is available in those countries.
Front companies have several options for obtaining technology and
materiel. They often are used to solicit bids for technology or products from
legitimate companies. The victim companies often will provide detailed
technical knowledge in hopes of being competitive and making sales. The front
34
companies also are useful as transshipment points for purchasing materiel and
then making prohibited exports.
In the United States, front companies have the advantage of being “U.S.
Persons” under the law; that status constrains the ability of CIA and NSA, for
example, in monitoring company activities. Dave Szady, the FBI’s chief
counterintelligence official, reported in 2005 that the Chinese operated more
than 3,000 front companies in the United States. The primary purpose of those
companies, he said, is to purchase or steal controlled technologies.
35
Martin Shih, a U.S. resident, owned several front companies that included
Night Vision Technology in San Jose and Queening Hi-Tech in Taiwan. Shih
used these cover companies to ship advanced U.S. night vision technology to
centers such as the North China Research Institute, which is closely linked to the
People’s Republic of China (PRC) military. Shih was assisted in the shipments
by Philip Cheng, who owned a front company called SPCEK. Cheng reportedly
told FBI agents that he and Shih had been working together to transfer night
vision technology to the PRC for approximately three years. One technique used
by Shih and Cheng reportedly was to provide shipping documents stating that
Taiwan was the final destination for the cameras. The cameras then were
diverted to China. The Chinese military reportedly was able to reverse engineer
36
Surveillance usually requires that you first identify the operatives of the
opposing intelligence service—the case officers. These are usually staffers of the
opponent’s embassy in country. Identifying intelligence officers in an embassy is
the FBI’s job in the United States and CIA’s job overseas. In the United
Kingdom, a similar separation exists between MI-5 and MI-6. Domestic
surveillance is much easier to do; you control the environment and can get help
from local law enforcement and from telecommunications companies. Overseas,
your counterespionage officers mostly are operating illegally, so these resources
are not as easily available. In some countries, though, liaison (e.g., local law
enforcement) can be used to help in surveillance. And telecommunications
company employees or law enforcement officials can be recruited as agents to
help in surveillance or countersurveillance.
Good surveillance teams go through extensive training and also usually
have a number of years of experience in both surveillance and
countersurveillance. This is definitely a learned art. The best services in this field
also equip their teams with sophisticated high-tech devices to assist in
surveillance.
both during and after the Stalin era, were similarly obsessed with finding moles
and had similar problems. The British MI-5 was torn during much of its Cold
War history by searches for moles—a number of which actually existed. 40
Chinese, and others have been known to surreptitiously enter hotel rooms to
examine briefcases and computers left behind by visiting officials and
businessmen.
The challenge is first, to not get caught, and second, to leave behind no
evidence of surreptitious entry. As a result, clandestine services have developed
to a fine art many technical skills associated with successful entry. Lock picking,
creating duplicate keys, and defeating combination locks are well-known
examples. And the entry does not always involve rooms or safes. The skill called
flaps and seals, described earlier, is applied to open and copy mail that may be of
intelligence interest, leaving behind no evidence of the opening. 42
ISSUES IN CLANDESTINE COLLECTION
OVERT COLLECTION
designed to leave visitors exhausted and off guard. It starts with a hectic day of
tourism, followed by an evening cocktail reception. After a few drinks, the
visitor is approached by a graduate student seeking research assistance, usually
on a topic that the visitor had previously been unwilling to discuss. The Chinese
approach is one of subtlety; they steal secrets only when necessary, preferring to
persuade foreign visitors to give them up voluntarily.46
Plant Visits. Visits to a manufacturing plant or other facility are a timetested way
to obtain intelligence. The Chinese had a monopoly on porcelain manufacturing
until the early 1700s, when a Jesuit priest visited the Chinese royal porcelain
factory and obtained the secrets of porcelain manufacturing for the French—who
in turn lost the secret to a British industrial spy. Nearly a century later, Britain
lost its edge in cotton manufacturing when a wealthy Bostonian named Francis
Cabot Lowell visited English and Scottish textile mills, memorized the designs
and floor layouts, and duplicated them in Waltham, Massachusetts. 48
During the Cold War, plant visits often were used for obtaining advanced
technology for military use. The Soviets, and later the Chinese, made numerous
visits to U.S. industrial facilities in attempts, often successful, to acquire
advanced military and civilian technologies.
States and other countries were reluctant to share information with West German
intelligence, fearing that it had been penetrated by the East Germans (which
turned out to be the case).
Intelligence liaison also is not uncommon among governmental and
nongovernmental groups. Nongovernmental organizations provide many
opportunities for government or commercial firms to conduct liaison for
intelligence gathering. Two historical examples are the World War II liaison set
up by the U.S. Office of Naval Intelligence with Mafia groups for
counterespionage operations using dock workers’ unions and by the Office of
Strategic Services for subsequent operations against the Fascist government in
Sicily. Mafia chief “Lucky” Luciano was released from prison, reportedly for his
assistance in counterintelligence and to help with the Sicilian operation.
51
The ethics of the Mafia liaison have been hotly debated over the years, and
many intelligence officers argue that intelligence groups should not cooperate
with criminal organizations. Their reservations are often summed up with the
adage “If you go to bed with dogs, expect to wake up with fleas.” The contrary
argument is that one should use a nonjudgmental approach when choosing
liaisons—if they can help more than they hurt, use them.
Liaison has a number of risks, one being the issue of false corroboration. It
is not uncommon for several intelligence services to unwittingly use the same
agent. (After all, if one service will pay you for what you know, others may be
willing to do so.) When the agent’s information is shared among intelligence
services through liaison, it will seem to come to the analyst from different
sources—the liaison service and the analyst’s own HUMINT service. As a result,
a single agent’s information will be given added credibility that it does not
deserve.
Liaison reports have a special credibility problem because the liaison
service has its own agenda. The United States and other countries make use of
liaison services. But they have to continually be aware of the potential bias of
the second party collector.
Another problem with liaison is that you have to rely on the liaison service
to check out the source’s credentials (vetting the source, as discussed earlier).
Beginning in 2000, Germany’s Federal Intelligence Service, the BND, provided
the United States with intelligence about Iraq’s alleged biological warfare (BW)
program from a human source codenamed “Curveball.” In this case, the
Germans themselves apparently were suspicious of the source but did not allow
U.S. intelligence officers to interview him. U.S. analysts nevertheless relied
heavily on Curveball’s information in reaching an erroneous judgment that Iraq
had an active BW program in 2002. 52
Liaison with neutral or unfriendly powers comes with additional risks. You
cannot be certain what friendly services will do with the intelligence you
provide. Things are even less certain with neutral or unfriendly services. During
the 16th century, under the reign of Sultan Suleiman the Magnificent, the
Ottoman Empire developed a competent intelligence service by relying on
liaison with Venice’s diplomatic and HUMINT services. But the Venetians in
turn used the relationship to report to European governments on the character
and activities of the Sultan. Sweden, while pursuing a policy of nonalignment,
53
had liaison with both Nazi and Allied intelligence services during World War II
and with Western powers (primarily Britain and the United States) during the
Cold War. The outcome benefited both Sweden and its liaison partners; but for
54
both sides, the risk that the Swedes would also help the opponents made for
strained relationships. In a later phase of the Cold War, the United States shared
intelligence with China during the brief Chinese invasion of Vietnam in 1979. 55
with Syria after 9/11 because of Syria’s interest in not being perceived as
supporting the attacks. The intelligence that is provided in these circumstances
58
has to be viewed with great caution and at least cross checked against other
sources. There is a substantial risk that the liaison service will manipulate the
intelligence it provides, to benefit its own interests.
While liaison is listed here under the heading of overt collection, it can be
overtly or clandestinely conducted. Some liaison relationships are extremely
sensitive and must be handled clandestinely. Examples include liaison where two
countries officially have chilly diplomatic relations or where the liaison
relationship would cause problems for either party with a third country if known.
Two-sided liaison relationships commonly involve trading information. But
sometimes the exchange is of information for something else of value to one
side. Instead of information, one side may get hardware for intelligence
collection (e.g., to improve the quality of intelligence it provides to the other
side). Sometimes, intelligence is exchanged for diplomatic or commercial favors.
The result is that two-sided liaison sometimes appears to be an unequal
exchange. The Italians tended to share intelligence with the Germans during
World War II but not vice versa. The KGB’s liaison with East European
59
services during the Cold War tended to benefit the Soviet Union more than it did
East European governments. In such cases, though, the primary beneficiary has
provided something of value—military support to its partners, in the case of
Nazi Germany and the Soviet Union.
Multisided liaison tends to be more overt. This kind of liaison has become
more common, driven by a shift from threats to nations to transnational threats,
where many countries have a common interest (in countering piracy, narcotics
trafficking, and terrorism, for example). The benefit of liaison, and especially
multisided liaison, is that intelligence ceases to be a zero-sum game. One state’s
gain in knowledge no longer is simply another state’s loss of its secrets; two or
more states receive the benefit.
• During 1993 and 1994 the international automobile industry was the
stage for the dramatic defection of J. Ignacio Lopez de Arriortua and six other
senior managers from General Motors (GM) to Volkswagenwerk AG. Lopez and
his colleagues apparently took a number of sensitive GM documents with them,
as any defector should do if he wishes to increase his value to his new
organization. Lopez was accused of masterminding the theft of more than 20
boxes of documents on research, planning, manufacturing, and sales when he left
GM to become a Volkswagen executive in 1993. The German government
followed the time-honored tradition of providing governmental protection for
defectors; they at first refused to prosecute Lopez, and a subsequent prosecution
was dropped. Volkswagenwerk AG eventually paid GM damages in a civil suit.
A U.S. grand jury subsequently indicted Lopez for fraud and transportation of
stolen documents, but Spain’s High Court refused to extradite him. Corporate
60
defectors to a country having less cordial relations with the United States would
likely gain more protection, as would the company they defected to.
• Gary Min worked as a research chemist for DuPont for 10 years before
accepting a job with DuPont competitor Victrex, a U.K. company, in October
2005. Between August and December of that year, Min downloaded 22,000
sensitive documents from DuPont files. His Victrex-owned notebook computer
was seized on February 8, 2006, while he was at a meeting with Victrex officials
in Geneva. The confiscated computer, containing some of the downloaded
documents, was given to the FBI. Victrex, tipped off by DuPont officials,
assisted in Min’s arrest. Min subsequently pleaded guilty to trying to steal $400
million worth of company trade secrets and was sentenced to 18 months in jail. 61
As these two examples suggest, what has been called “the insider threat”
tends to follow a certain pattern. Most thefts of proprietary and confidential
information are made by current employees. Furthermore, the thefts appear to
occur between the time when an employee has made the decision to leave the
company and the time when the employee actually leaves. 62
Prisoners and Detainees. Military and law enforcement officials have the
substantial advantage of conducting HUMINT in a controlled situation.
Prisoners and detainees can be coerced or cut deals for information. Intelligence
about the opposing forces, their positions, intent, and morale all can be obtained
from prisoners of war. Law enforcement officers obtain information about the
location of physical and financial assets and the identities of criminal network
leadership from prisoners. The interrogations of al Qaeda prisoners at
Guantanamo Bay have been controversial, but the detainees reportedly provided
key pieces of information that ultimately led to the location and death of Osama
bin Laden. 63
Chapter 2 described the Black Boomerang operation during World War II,
where the British operated radio stations that purported to be German military
news stations. The news reports described actual events that were remarkably
detailed, with subtle additions that were calculated to cause splits between the
German military and the Nazi party. This black propaganda operation made a
novel use of prisoner-based intelligence. A major source of the material came
from interrogations, from conversations among German prisoners of war
(POWs) that were captured by microphones conveniently hidden in POW
recreational areas, and from personal details pulled from letters that German
POWs sent to their families. Some German POWs, unhappy with the Nazis,
64
Structure
HUMINT differs from most other collection INTs in that it is so eclectic. As
with open source, any person is capable of collecting HUMINT, and many do so.
For governments and commercial entities, this presents a difficult structural
problem. How do you effectively organize to collect and disseminate HUMINT
with this vast number of potential collectors?
Furthermore, both governmental and nongovernmental HUMINT have a
very large customer set. These customer needs force the acquisition of a diverse
set of HUMINT sources. Policy customer needs differ from military support
needs, and the sources used differ significantly. As a result, most governmental
HUMINT is divided structurally in three basic ways: clandestine versus overt,
foreign versus domestic, and military versus nonmilitary.
Most governments operate a clandestine service, and it goes under many names:
CIA’s National Clandestine Service (NCS), the UK’s Secret Intelligence Service
(SIS, popularly known as MI-6), and Russia’s Sluzhba Vneshney Razvedki
(SVR, the successor to the KGB). Whatever the name, a clandestine service does
many other things besides secretly exploiting agents for the purpose of collecting
intelligence (that is, clandestine HUMINT collection). It typically is responsible
for a range of foreign clandestine intelligence operations including espionage,
counterespionage, covert action, and related foreign liaison activities. For
example, a clandestine service
• works in liaison with other governmental services (domestic and foreign) to
run all types of operations;
• protects its operations and defends the government from other intelligence
services by engaging in a variety of counterespionage activities, including
the aggressive use of double agents and penetrations of foreign services;
Ethical and legal restrictions often force separate structures within HUMINT.
Primarily, this concerns the problem of separating domestic from foreign
intelligence. The United Kingdom maintains separate domestic (MI-5) and
foreign (MI-6) intelligence services. Russia separates its Federal Security
Service (FSB) from the SVR. Israel has the Mossad for foreign intelligence and
the General Security Service (Shin Bet) for domestic and counterintelligence. 69
The United States traditionally has separated the two, with the CIA being
responsible for foreign intelligence and the FBI taking the lead on domestic
intelligence.
Some countries combine domestic and foreign intelligence in one
organization. China’s Ministry of State Security, for example, has both an
internal and an external mission. Such a combination has some advantages:
persons of intelligence interest are less likely to be lost when moving from a
foreign to a domestic location (or vice versa) if their movements are under the
cognizance of a single agency. This was identified as a problem in postmortems
of the 9/11 attacks. Subsequently, in 2005, a National Clandestine Service was
created with authority to coordinate foreign HUMINT operations of other
agencies such as the FBI and DIA. The NCS, which reports to the Director of the
CIA, is comprised of collection management officers, operations officers (case
officers), paramilitary operations officers, and support personnel. But the
domestic/foreign organizational separation was maintained; the NCS continues
to focus outside U.S. borders, and the FBI continues to focus on domestic issues,
with a requirement that the two collaborate closely.
Since 2005, the U.S. distinction between foreign and domestic intelligence
officially has been blurred; it’s now all supposed to fall under the umbrella of
national intelligence. However, things aren’t quite as simple as that in the world
of HUMINT collection. Within the United States, HUMINT collection remains a
responsibility of several national agencies.
To illustrate, consider the stated mission of the FBI’s Directorate of
Intelligence, which is to penetrate transnational networks including terrorist
organizations, foreign intelligence services, those that seek to proliferate
weapons of mass destruction, and criminal enterprises. There appears to be at
least an overlap of responsibility with the Department of Homeland Security in
counterterrorism, with the DEA in counternarcotics, and with local law
enforcement in countering criminal enterprises. Stresses have developed, for
example, between the FBI and the New York Police Department (NYPD) in the
area of HUMINT collection. The NYPD’s Intelligence Division has sent
detectives (functioning as HUMINT collectors in the law enforcement arena)
outside state borders and to foreign countries such as India, angering the FBI
leadership.70
The United States is not unique in dealing with such stresses. The U.K.
Security Service, known as MI-5, is responsible for “protecting the United
Kingdom against threats to national security from espionage, terrorism and
sabotage, from the activities of agents of foreign powers, and from actions
intended to overthrow or undermine parliamentary democracy by political,
industrial or violent means.” But inevitably there is overlap between MI-5’s
mission and that of local law enforcement.
Both national and local law enforcement units also deal with the clandestine
versus overt division of HUMINT. Undercover police officers operate in many
localities, while other police officers collect HUMINT overtly as part of their
routine patrols or in interrogating detainees. The FBI used clandestine agents for
years to penetrate and monitor the activities of the Ku Klux Klan.
If they have the resources to do so, countries tend to separate their military from
nonmilitary HUMINT collection. Russia long has kept the KGB (now SVR)
separate from the military’s intelligence service, the Glavnoye
Razvedyvatel’noye Upravleniye (GRU). The Second Department of the Chinese
People’s Liberation Army General Staff has a responsibility for HUMINT that is
separate from that of China’s Ministry of State Security. The Military
Intelligence Branch (AMAN), part of the Israeli Defense Forces, provides
military intelligence that is separate from Mossad.71
The second division that has to be considered is that between overt and
clandestine HUMINT. All of today’s U.S. military services and combat
commands have established organizations to recruit spies and debrief individuals
of interest in order to gather information about foreign weapons systems,
doctrine, and other matters of interest to military officials. The significance
attached to clandestine HUMINT operations has varied among the services and
within some of the services over time. From 1966 to 1977, the Navy operated a
clandestine collection unit, designated the Naval Field Operations Support
Group and known as Task Force 157. The Army maintained a consistently high
level of interest in HUMINT throughout the Cold War. From 1981 to 1989, the
U.S. Army’s Intelligence Support Activity provided clandestine HUMINT and
conducted covert operations to support military operations.
73
The current U.S. military clandestine HUMINT structure dates from 1995,
when the Defense HUMINT Service (DHS) was created within DIA. DHS
absorbed the HUMINT efforts of the services. The Army vigorously opposed the
move because it had the most to lose. The reorganization was intended to reduce
the cost of four separate military HUMINT organizations and to improve
collaboration in military HUMINT. At the same time, overt and clandestine
HUMINT were combined within one organization: DHS also assumed
responsibility for the Defense Attaché System and consequently for the overt
collection of information for military customers.
74
COMMERCIAL
• The Chinese Ministry of State Security operates with few paid agents
but relies on an extensive network of students, travelers, and citizens abroad of
Chinese descent. Most of these are volunteers or engage in espionage in return
for something that China can offer (such as good treatment for the agent’s family
in China or business opportunities tied to China’s booming economy.) The 77
Chinese approach has both advantages and drawbacks. It provides a great deal of
incoming raw intelligence, but much of it is low grade, and some of it is
misleading. A lot of resources have to be allocated just to collating the incoming
intelligence. The job that Chinese intelligence faces in assessing the volume of
incoming raw intelligence has to be a massive one, with consequent risks of
being taken in by a deception operation.
Summary
The traditional HUMINT as depicted in spy novels is collected clandestinely.
Such HUMINT at the national level is usually carried out by intelligence officers
known as case officers who work for a clandestine service. Case officers
normally make use of agents, either recruited or volunteers (known as walk-ins),
who operate under the service’s control. National and local law enforcement also
collect clandestine HUMINT, normally by using informants: sources that are not
controlled and often won’t accept tasking.
A clandestine service has many other responsibilities in addition to
clandestine collection. The unifying aspect of these activities is not some
connection to HUMINT; rather, they are highly diverse but interdependent
activities that are best conducted by a clandestine service. They include liaison,
covert action, and counterintelligence. So not all of the activities of a clandestine
service involve HUMINT collection. The converse is also true. Not all
government-collected HUMINT is collected by clandestine services. Diplomatic
services have long engaged in HUMINT, both openly and clandestinely. Law
enforcement organizations do the same.
In addition to spies (agents), HUMINT is collected from liaison contacts,
émigrés, defectors, detainees, and travelers—sometimes clandestinely,
sometimes overtly.
• Defectors have departed their home country illegally and are more
likely to have information of value than émigrés, who depart legally.
• Diplomats have a long history of collecting intelligence, usually overtly
or via liaison with their counterparts. Military, law enforcement, and agricultural
attachés, for example, collect specialized intelligence for their parent agencies—
though they may not call it intelligence. Liaison provides many benefits but
carries risks that the liaison partner will use the relationship for perception
management, will engage in unsavory activities, or will demand an unacceptable
quid pro quo.
• Interrogation of prisoners and detainees has the advantage that you have
control of the source and can offer inducements to get information.
• Travelers to other countries and students abroad are potential sources for
elicitation when they return. Use of such travelers for commercial espionage has
been practiced for centuries. Governments wishing to acquire advanced
technology, such as China, have developed such espionage to a fine art.
Running the agent requires guiding the collection effort and getting the
collected material back to headquarters. Support to the agent, or care and
feeding, requires that the case officer provide espionage equipment, funds, and
cover. The primary challenges in this stage involve clandestine communication
with the agent and acquiring the agent’s information using techniques such as
dead drops and brush passes.
All clandestine relationships end eventually, and the end stage has to be
planned for. The agent may leave voluntarily or be retired or may have to be
exfiltrated because the risk of exposure has become too great.
Clandestine HUMINT operatives operate in foreign countries under some
form of cover. There are two types of cover—official and nonofficial. The
deepest level of cover is nonofficial cover. Such operatives are called NOCs by
the CIA and British SIS, and “Illegals” by the Russians. Increasingly, it is
difficult to maintain either type of cover because of biometric identification and
the wide availability of biographic data on the Internet.
Major intelligence services make use of front companies, known as
proprietaries, for espionage cover, support to covert operations, and acquiring
technology, equipment, and industrial know-how.
Clandestine services conduct a number of operations that fall into the
category loosely called tradecraft. Surveillance and countersurveillance are two
of these. Surveillance involves either human observation or technical operations
(audio or video collection). Countersurveillance, as the name implies, is aimed at
defeating an opposing intelligence service’s surveillance attempts. A third
tradecraft operation, surreptitious entry, involves gaining access to locked rooms
and safes, to computers, or to mail (an area of tradecraft called flaps and seals).
The goal is to (1) not get caught in the act and (2) leave no evidence of the act
behind.
An intelligence service very much wants to have double agents (an
opponent’s agents who have been turned) or moles (agents emplaced in a hostile
service) working for them. And every clandestine service greatly fears having
their own agents turned or moles within their own service. A major function of
counterintelligence lies in recruiting the former and identifying the latter.
The major part of HUMINT is collected overtly rather than clandestinely,
mostly using one of these techniques:
Elicitation is the practice of obtainingb information about a topic from
conversations, preferably without the source knowing what is happening.
Elicitation is widely practiced in gatherings of diplomats and military attachés
and in the commercial sector. It requires selecting the right setting, timing the
questions properly, and asking the right questions. Sampling techniques are also
used, much as is done in public opinion polling.
Plant visits to obtain intelligence about manufacturing techniques and
technology have a long history; their use increased significantly during the Cold
War.
Liaison relationships are mostly bilateral and involve sharing intelligence, often
in exchange for equipment or diplomatic or commercial favors. Multilateral
relationships have become increasingly important in dealing with issues such as
terrorism and weapons proliferation.
Interrogation is used to obtain information from prisoners and detainees.
Coercive interrogations, including some of what are called “enhanced
interrogation” techniques, have given interrogation a bad name. But there is a
rich set of techniques available to persuade or mislead prisoners and detainees
into cooperating and providing intelligence without resorting to the questionable
techniques.
HUMINT is collected by many organizations from many sources and for
many purposes. As a result, there are many different structures, potential for
overlapping collection, and intelligence sharing issues in HUMINT. Legal
restrictions or the nature of collection often require separating foreign from
domestic collection, as is done in the United States, the United Kingdom, Russia,
and Israel. But countries such as China combine the two in order to better track
people as they move into and out of the country. Because the military is the
biggest single customer, most countries have a separate organization to handle it
and further subdivide military HUMINT into national and tactical levels.
Homeland security and local law enforcement have continuing issues about
where the boundary is. Multinational corporations collect HUMINT for
commercial purposes, sometimes sharing the product with government
organizations.
NOTES
1. Richard Grenier, “Colonel Redl: The Man Behind the Screen Myth,” New York Times (October 13, 1985), accessed 21 September 2012 at
http://www.nytimes.com/1985/10/13/movies/colonel-redl-the-man-behind-the-screenmyth.html.
2. P. Redmond, “The Challenges of Counterintelligence.” Chapter 33 in L. Johnson (ed.), The Oxford Handbook of National Security Intelligence (Oxford: Oxford University Press, 2010),
541.
3. Ian Traynor, “WikiLeaks Cables Claim First Scalp as German Minister’s Aide is Sacked,” The Guardian (December 3, 2010), accessed 21 September 2012 at
http://www.guardian.co.uk/media/2010/dec/03/wikileaks-first-scalp-germanaide.
4. Mark Bowden, Killing Pablo (Atlantic Monthly Press, 2001).
5. “Timeline: The Intelligence Hunt Leading to Bin Laden,” BBC News South Asia (May 6, 2011), accessed 21 September 2012 at http://www.bbc.co.uk/news/world-south-asia-13279283.
6. Clarence Walker, “A Special Investigative Report: American Mafia Recruits Sicilian Mafia,” in American Mafia.com (August 2004), accessed 21 September 2012 at
http://www.americanmafia.com/Feature_Articles_272.html.
7. David S. Landes, The Wealth and Poverty of Nations (New York: W. W. Norton and Company, 1998), 276.
8. Ibid., 279.
9. Ibid.
10. Arthur Weiss, “How Far Can Primary Research Go?” Competitive Intelligence Magazine (November–December 2001), 18.
11. “France, Israel Cited in CIA Espionage Study,” Los Angeles Times (August 15, 1996), accessed 21 September 2012 at http://articles.latimes.com/1996-08-15/business/fi-
34524_1_economic-espionage.
12. Henry Samuel, “Chinese Use Honeytraps to Spy on French Companies, Intelligence Report Claims,” Telegraph (February 2, 2011).
13. Douglas F. Garthoff, “Directors of Central Intelligence as Leaders of the US Intelligence Community, 1946–2005” (2007), Chapter 12, accessed 21 September 2012 at
https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/directors-of-central-intelligence-as-leaders-ofthe-u-s-intelligence-
community/chapter_12.htm.
14. R. Wallace and H. K. Melton, Spycraft: The Secret History of the CIA’s Spytechs, from Communism to al-Qaeda (New York: Dutton, 2008), 365.
15. James Olson, The Ten Commandments of Counterintelligence, Center for the Study of Intelligence (2007), p. 242. Accessed 21 September 2012 at https://www.cia.gov/library/center-for-
the-study-of-intelligence/csi-publications/csistudies/studies/fall_winter_2001/article08.html.
16. Benjamin Weiser, A Secret Life (New York: Public Affairs, 2004).
17. James Olson, The Ten Commandments of Counterintelligence.
18. D. Wise, Spy: The Inside Story of How the FBI’s Robert Hanssen Betrayed America (New York: Random House, 2002), 270–281.
19. John Ehrman, “What Are We Talking About When We Talk About Counterintelligence?” Center for the Study of Intelligence, Studies in Intelligence, Vol. 53, No. 2 (2009), 18, accessed
21 September 2012 at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/v0153n02/toward-a-theory-of-ci.html.
20. Wise, Spy: The Inside Story of How the FBI’s Robert Hanssen Betrayed America, 12.
21. Ibid., 14.
22. M. Beardon and J. Risen, The Main Enemy: The Inside Story of the CIA’s Final Showdown with the KGB (New York: Random House, 2003), 198–202.
23. R. Wallace and H. K. R. Melton, Spycraft, 420.
24. Ibid., 31.
25. Yudhijit Bhattacharjee, “Tale of a Would-be Spy, Buried Treasure, and Uncrackable Code,” Wired (January 25, 2010), accessed 21 September 2012 at
http://www.wired.com/magazine/2010/01/ff_hideandseek/4/.
26. R. Wallace and H. K. R. Melton, Spycraft: The Secret History of the CIA’s Spytechs, from Communism to al-Qaeda, 421–441.
27. Robert L. Benson, “The Venona Story,” NSA/CSS Historical Publications, accessed 24 September 2011 at http://web.archive.org/web/20060614231955/
http://www.nsa.gov/publications/publi00039.cfm.
28. Shlomo Shpiro, “Speak No Evil,” in Jan Goldman (ed.), Ethics of Spying, Volume 2 (Lanham, MD: The Scarecrow Press, 2010), 63.
29. Antonio J. Mendez, “A Classic Case of Deception,” CIA Studies in Intelligence, (Winter 1999/2000), accessed 25 September 2011 at https://www.cia.gov/library/center-for-the-study-of-
intelligence/csi-publications/csi-studies/studies/winter99–00/art1.html.
30. Peter Baker, “Swap Idea Emerged Early in Case of Russia Agents,” New York Times (July 9, 2010), accessed 21 September 2012 at
http://www.nytimes.com/2010/07/10/world/europe/10russia.html?ref=russianspyring2010&pagewanted=2.
31. Nicholas Anderson, NOC: Non-official Cover: British Secret Operations (London, UK: Enigma Books, 2009).
32. “A Tide Turns,” The Economist (July 21, 2010), accessed 21 September 2012 at http://www.economist.com/node/16590867/.
33. William M. Leary, “About Air America,” accessed 21 September 2012 at http://www.air-america.org/About/History.shtml.
34. E. M. Roche, Corporate Spy: Industrial Espionage and Counterintelligence in the Multinational Enterprise (New York: Barraclough, 2008), 131–135.
35. P. Devenny, “China’s Secret War,” FrontPageMagazine.com (March 31, 2005), accessed 21 September 2012 at http://archive.frontpagemag.com/Printable.aspx?ArtId=9146.
36. Henry K. Lee, “Cupertino Man Gets 2 Years for Exporting Military Technology to China,” San Francisco Chronicle (December 5, 2007), accessed 21 September 2012 at
http://articles.sfgate.com/2007-12-05/bay-area/17273210_1_china-homelandsecurity-affidavit.
37. P. Devenny, “China’s Secret War.”
38. Joby Warrick, “Iran Using Fronts to Get Bomb Parts from US,” Washington Post (January 11, 2009), A01.
39. See, for example, Tom Mangold, Cold Warrior: James Jesus Angleton—CIA’s Master Spy Hunter (New York: Simon & Schuster, 1991).
40. See Peter Wright, Spycatcher (New York: Viking Penguin, 1987), for details on the search for moles within MI-5 and MI-6.
41. Christopher Andrew and Vasili Mitrokhin, The World Was Going Our Way (Cambridge, MA: Perseus Books, 2005), 225.
42. Wallace and Melton, Spycraft, 208–213.
43. Shlomo Shpiro, “Speak No Evil,” 61–62.
44. Commission on the Roles and Capabilities of the United States Intelligence Community (1996), Chapter 10, accessed 21 September 2012 at http://www.gpoaccess.gov/int/int014.pdf.
45. D. Wise, Spy: The Inside Story of How the FBI’s Robert Hanssen Betrayed America, 13.
46. Ibid.
47. Peter Schwartz, The Art of the Long View (New York: Doubleday, 1991), 78.
48. Brian Champion, “A Review of Selected Cases of Industrial Espionage and Economic Spying, 1568–1945,” Intelligence and National Security, v. 13, no. 2 (1998), 123–143.
49. Gregory F. Treverton, Reshaping National Intelligence for an Age of Information (Cambridge, MA: Cambridge University Press, 2001), 137.
50. Michael Herman, Intelligence Power in Peace and War (Cambridge, UK: Cambridge University Press, 1996), 211.
51. Richard Eels and Peter Nehemkis, Corporate Intelligence and Espionage (Old Tappan, NJ: Macmillan, 1984), 59; Charles D. Ameringer, U.S. Foreign Intelligence (Lanham, MD:
Lexington Books, 1990), 170.
52. “Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction” (March 31, 2005), 80, accessed at
http://www.gpo.gov/fdsys/pkg/GPO-WMD/content-detail.html.
53. Lord Kinross, The Ottoman Centuries (New York: William Morrow, 1971), 175.
54. Wilhelm Agrell, “Sweden and the Dilemmas of Neutral Intelligence Liaison,” Journal of Strategic Studies (August 2006), 633–651.
55. Henry Kissinger, On China (New York: Penguin Press, 2011), 360.
56. Rod Nordland, “Files Note Close CIA Ties to Qaddafi Spy Unit,” New York Times (September 3, 2011).
57. Jennifer E. Sims, “Foreign Intelligence Liaison: Devils, Deals, and Details,” International Journal of Intelligence & Counter Intelligence, Vol. 19, No. 2 (Summer 2006), 195–217.
58. Ibid.
59. Ben Macintyre, Operation Mincemeat (New York: Harmony Books, 2010), 253.
60. Emma Daly, “Spain Court Refuses to Extradite Man G.M. Says Took Its Secrets,” New York Times (June 20, 2001), accessed 21 September 2012 at
http://www.nytimes.com/2001/06/20/business/spain-court-refuses-to-extradite-man-gmsays-took-its-secrets.html?ref=joseignaciolopezdearriortua.
61. Larry Greenemeier, “Massive Insider Breach at DuPont,” Information Week (February 15, 2007), accessed 21 September 2012 at http://www.informationweek.com/news/197006474.
62. Ibid.
63. Marc A. Thiessen, “Punishing the Heroes,” Pittsburgh Post-Gazette (May 6, 2011), accessed 21 September 2012 at http://www.post-gazette.com/pg/11126/1144413–109–0.stm?
cmpid=news.xml.
64. Sefton Delmer, Black Boomerang (New York: Viking Press, 1962).
65. Intelligence Science Board, Educing Information: Interrogation: Science and Art, National Defense Intelligence College Press (2006), 130.
66. Steven Miles, “Torture and the Medical Profession,” in Ethics of Spying, Vol. 2, Jan Goldman, ed. (Lanham, MD: Scarecrow Press, 2010), 183.
67. U.S. Congress, “IC21: The Intelligence Community in the 21st Century” (June 5, 1996), Chapter 9, accessed 21 September 2012 at http://www.gpo.gov/fdsys/pkg/GPO-IC21/content-
detail.html.
68. Ibid.
69. Shlomo Shpiro, “Speak No Evil,” 60.
70. Jeff Stein, “NYPD Intelligence Making FBI Blue,” Washington Post (April 26, 2010), accessed 21 September 2012 at
http://voices.washingtonpost.com/spytalk/2010/04/nypd_intelligence_making_fbi_b.html.
71. Ibid.
72. Commission on the Roles and Capabilities of the United States Intelligence Community, Chapter 10.
73. Ibid.
74. Ibid.
75. Richard L. Russell, “The Weakest Link,” in Rethinking the Principles of War, Anthony D. McIvor, ed. (Annapolis, MD: Naval Institute Press, 2005), 471.
76. Gordon Thomas, “Mossad’s License to Kill,” Telegraph (February 17, 2010), accessed 21 September 2012 at
http://www.telegraph.co.uk/news/worldnews/middleeast/israel/7254807/Mossads-licence-to-kill.html.
77. Wise, Spy: The Inside Story of How the FBI’s Robert Hanssen Betrayed America, 12–13.
4. Communications Intelligence
enforcement organizations would undoubtedly drop the word foreign from this
definition.) Communications in this definition includes voice and data
communications, facsimile, video, and any other deliberate transmission of
information. Internet transmissions are a form of communication, but their
collection and analysis is treated in Chapters 2 and 5.
COMINT in the most general sense long predates the development of
telecommunications. The intercept and analysis of semaphore (signal flag)
communications and American Indian smoke signals was common centuries
ago. And governments routinely have intercepted foreign government
communications for decades. Today COMINT is a large-scale activity providing
customers with intelligence on diplomatic, military, economic, and scientific
developments internationally, as well as supporting law enforcement efforts
domestically.
Function
The functions served by COMINT—that is, the targets—have changed steadily
and expanded significantly throughout the last century. Throughout the first half
century, the primary targets were military and diplomatic communications.
Beginning about midcentury, world trade grew rapidly and the collection of
economic intelligence became important. At about the same time, COMINT also
began providing information about scientific and technical developments. Late
in the 20th century, narcotics trafficking, money laundering, and organized crime
became important targets. During the first decade of this century, international
terrorism became the preeminent target.
At the strategic level, COMINT collection, like human intelligence
(HUMINT) collection, can provide insights into plans and intentions. It can
contribute information about people, organizations, financial transactions,
equipment, facilities, procedures, schedules, budgets, operations, testing,
deployment, and environmental conditions. COMINT gives insights about
personal and organizational relationships. It reveals details about sensitive or
classified programs. In the past, COMINT seldom provided much detail because
it dealt primarily with brief conversations. This is no longer the case, as large
volumes of material are now transmitted by data communications or facsimile.
COMINT, for example, reportedly provided the critical element in
identifying Libya’s Rabta chemical plant as a producer of chemical warfare
(CW) agents. In 1998, a toxic waste spill occurred at the plant. According to a
report prepared by the U.S. Congress’s Office of Technology Assessment,
Libyan officials placed emergency phone calls to Imhausen-Chemie, the West
German firm that had designed the plant. Frantic to get advice on cleaning up
and repairing the plant, the Libyans discussed the problem at length with the
Germans—confirming that the plant was in fact producing CW and that the
German firm knew that fact. 2
COMINT also can provide operational support in the nonmilitary arena, for
example, in supporting negotiations. Soon after the United States sat down in
Washington with other naval powers in 1921 to negotiate a naval armaments
treaty, it acquired a substantial advantage. The American “Black Chamber” (the
Cipher Bureau, the forerunner of NSA), under Herbert Yardley, was monitoring
the delegates’ communications. Yardley’s team broke the cipher used by
Japanese participants. The American negotiators then were able to get the
minimum possible deal the Japanese had indicated they would accept, absent
which the Japanese would have left the conference. 5
Process
There are several steps involved in COMINT collection. The process almost
always starts with targeting, followed by obtaining access and collecting the
information from the communications link. Then comes what is commonly
referred to as the back end: processing, analysis, and finally, dissemination of the
raw intelligence. Let’s go through these steps, one at a time.
TARGETING
Laser radar techniques have been used to exploit audio vibrations from
windows or similar fixtures within an office since the 1960s. The principle is the
same as for radio frequency flooding. An infrared laser (which is invisible to the
human eye) can be aimed at an office window from distances ranging up to
hundreds of yards. If the proper infrared band is selected for the laser, the
window glass will reflect the energy. Conversations inside the office will cause
the windowpane to vibrate slightly, and these audio vibrations will modulate the
reflected laser energy. An optical receiver located near the laser transmitter can
then pick up the backscattered energy, demodulate it, and recover the audio. The
technology to use such laser devices is now widely available.7
done near the phone itself, near the tower, or at the routing center.
Cell phone networks today are encrypted, but most current encryption
provides little protection. The most popular cell phone encryption worldwide is
Global System for Mobile communications, or GSM. GSM encryption can be
broken routinely and not just by government COMINT services. Commercially
available intercept kits can crack wireless GSM encryption on these phones, at a
modest price of about $2,000. The kits mimic cell phone tower base stations to
take control of a cell phone. They then defeat the encryption, and according to
one expert in the field, “take your call and manage it just like [it] was the cell
tower, forwarding it on through the rest of the network.”
10
Cell phones are mobile, but they can still be located and tracked—a big
advantage in surveillance of a target. Almost all cell phones carry GPS that
provides their precise location; failing that, an intercept operator also can
identify the cell tower being used or use direction-finding equipment to locate
the cell phone’s position. Revisiting the case of drug kingpin Pablo Escobar yet
again, Colombian police found Escobar in the city of Medellin by using U.S.-
provided direction-finding equipment against his cell phone. 11
Push-to-Talk. COMINT units have long targeted what are called push-totalk
communications. They are called push-to-talk because, like a citizens’ band (CB)
radio, you cannot listen and talk simultaneously. You must push the transmit
button to communicate and release it to listen. Many radios used by military
forces for air-to-ground and ground-to-ground tactical communications are push-
to-talk. During World War II, the U.S. Army relied on handheld radios, called
walkie-talkies, for tactical ground communications. These radios were targets for
both German and Japanese field COMINT units. More modern push-to-talk
radios have proved to be profitable targets for intelligence collection by field-
deployed signals intelligence (SIGINT) units in the fighting in Iraq and
Afghanistan. Especially in an urban counterinsurgency environment, short-range
(line-of-sight) wireless communications are common. They typically use either
handheld push-to-talk radios or cell phones.
13
During World War II, COMINT was used extensively to monitor the long-
range HF communications of ships and submarines. Large directionfinding
antennas allowed both sides to locate seaborne units and track their movements.
Satellite communications largely replaced HF for long-distance
communications in the latter part of the 20th century. But HF enjoyed a
resurgence for tactical use during the Vietnam War. The U.S. Army found that a
technique called Near Vertical Incidence Skywave (NVIS) could provide reliable
communications over short ranges, even over mountainous terrain. The signal is
sent almost vertically and bounces off the ionosphere and back to receivers
within a few hundred kilometers. Because the signal did not propagate to long
ranges, NVIS provided some security; COMINT units could only intercept the
signal at locations relatively close to the transmitter (on the order of a few
hundred kilometers, depending on the operating frequency and ionospheric
conditions).
COMINT sites. Israel maintains a major COMINT base at Urim, in the Negev.
The base reportedly collects against Intelsat satellites, maritime communications
via Inmarsat, and numerous regional satellites operated by Arab countries. Even
19
The United States and other countries have had some success in tapping
into undersea cable communications, according to the literature. In the early
1970s, the U.S. government learned of the existence of an undersea cable
running parallel to the Kuril Islands chain, connecting the major Soviet naval
bases at Vladivostok and Petropavlovsk. A program nicknamed IVY BELLS was
established to tap into the cable.
In 1981, however, the program halted abruptly after Western satellites
photographed a small fleet of Russian warships gathered over the exact location
of the listening device. The operation had been betrayed to the KGB in January
1980 by Robert Pelton. 22
countries in the Middle East and North Africa use undersea cables in the area;
these cables also would likely be of interest to the Israelis.
Cable traffic originally was carried by copper coaxial cable, very similar in
design to the coaxial cables used in home television sets. Because it transmitted
a radio frequency signal, it could be collected without actually breaking into the
cable sheath.
Its replacement in most areas is fiber-optic cable, which presents much
more of an intercept challenge. Actually, there are two major challenges. First, a
fiber-optic cable has many fibers in it, each carrying a large volume of traffic.
You have to select fibers that carry interesting information and select the specific
material within each fiber. Second, the wide bandwidth of optical fiber makes it
impractical to download all of the communications for subsequent processing.
Before you can make that selection, though, you have to get access to the
fiber. A fiber cable that runs for some distance will have repeater boxes along its
length to amplify the transmitted signal.
Targeting Priorities. Because there are so many choices for COMINT targeting,
you have to identify the sources that the priority intelligence targets are likely to
use and concentrate on those.
ACCESS
After targeting, you have to get access to the communications link. COMINT
requires some form of access to the desired communications medium so that
communications can be collected. This can be a very easy process. Air-toground
(push-to-talk) communications and traditional HF communications are readily
intercepted over a wide area. Microwave point-to-point communications require
being close to a transmission tower or somewhere in the main beam of the link.
Some signals are more difficult to acquire because they are deliberately made
difficult to intercept (for example, by spreading the frequency bandwidth to an
extent that intercept receivers cannot match or transmitting a very weak signal,
just sufficient for the intended receiver). These are called low probability of
intercept (LPI) communications. Others require unusual, expensive, or intrusive
methods to gain access. Cable and wired telephone communications, for
example, often require a physical tap. The different means of access were
discussed in the previous section.
COLLECTION
PROCESSING
This is, at best, an imperfect step in the process. Material of intelligence value
inevitably winds up in what is sometimes referred to as “bit heaven”—discarded
because it is not recognized as having value.
The material that survives this severe filtering step then must be
categorized, prioritized, and routed to analysts for detailed exploitation. The first
step typically is to convert the material into a standard format and attach
message or signal related information; for example, the telephone numbers of the
parties to a telephone conversation would be attached so that they can be used
for phone number searches later on.
A number of other processing techniques then are used to further narrow the
incoming volume to manageable size. A few of these are:
• Processors must extract traffic from the bulk channels and place it in
categories for further processing. Three broad categories of interest have
typically been used: voice grade channels, which normally carry telephone
conversations; fax communications; and data (including message traffic). These
three need to be separated, because they will subsequently undergo different
types of processing.
• Word spotting is often used to identify possible communications of
interest. Most COMINT libraries contain names of persons, places, or things of
intelligence interest, and the appearance of these words in a message causes the
message to be tagged for further processing.
• Speech recognition systems do much the same thing, by automatically
selecting telephone communications of intelligence interest when the speaker
uses certain key words. 26
Cryptanalysis. There are basically two ways for a COMINT unit to decrypt an
encrypted message. The more difficult way is to have skilled cryptanalysts, aided
by powerful computers, break the code. The easy way is to have someone
(usually a HUMINT operative) steal the ciphers. Russia has a long history of
conducting very good COMINT by the simple expedient of stealing ciphers.
Tsarist Russia’s intelligence service, the Okhrana, is regarded as having had the
best code breakers in the world in its time, chiefly by virtue of its efforts at
purchasing or stealing codes and ciphers. Its replacement in the Soviet regime,
the OGPU (later KGB), continued the tradition with at least equal skill.27
Cryptanalysis often depends on the fact that certain words tend to appear in
official communications, especially in military communications. One way to
counter simple cryptanalysis, then, is to pad the text with irrelevant text. During
World War II, the U.S. Navy routinely added such text padding at the beginning
and at the end of encrypted communications, leading to one of the most noted
misunderstandings of an official message during that war.
During the naval battle of Leyte Gulf, Admiral William Halsey’s task force
34 was drawn off in pursuit of a Japanese decoy force, leaving a critical gap in
the Leyte Gulf defenses. The Pacific Fleet Commander in Chief, Admiral
Chester Nimitz, transmitted a message to Halsey that read (after decryption):
“TURKEY TROTS TO WATER GG FROM CINCPAC ACTION COM THIRD
FLEET INFO COMINCH CTF SEVENTY-SEVEN X WHERE IS RPT
WHERE IS TASK FORCE THIRTY FOUR RR THE WORLD WONDERS.” 29
The beginning (before GG) and the end (after RR) text was padding and
should have been removed before Halsey saw the message. It wasn’t. Halsey
apparently was well-read enough to know that the latter padding, “the world
wonders,” evokes the lines of Alfred Lord Tennyson’s poem, The Charge of the
Light Brigade. Taking that final sentence to be a deliberate insult, Halsey, as the
story goes, went into a fit of rage.
The digital computer allowed encryption to become widely available. The
computer can generate and use keys for encryption—some of which are
vulnerable to computer-based cryptanalysis, the better ones of which are almost
invulnerable to being broken. Since then, many governments have struggled to
deal with the resulting proliferation of encryption. Governments want to protect
their security services’ capability to decipher COMINT. At the same time, they
want to protect their industries against eavesdroppers trying to obtain
commercial intelligence. But how do you protect your commercial segment
while keeping criminal elements and terrorists from using the same
cryptography? If you’re the head of a SIGINT organization, you want to break
everyone else’s code but let no one break your code or the codes of the
organizations that you’re protecting. It’s a tough trade-off.
Also, independent groups eventually are going to develop their own
“unbreakable” codes. The alternative would be to make widely available some
codes that could be broken only by government agencies—even though some
governments would use that capability to help their own industries against
competitors. The governments then could keep more sophisticated encryption
technology for their own use—which is exactly what they try to do.
But governments move slowly. It takes time to shift government policies
and put the structure in place to make them work. That gives a big advantage to
individuals and small groups in this Internet age; these small entities are quick to
adapt and are technically savvy. For some time, the code makers have been
winning against the code breakers. Encryption technology has been outpacing
cryptanalysis. A recurring problem is the need to control the access to
“unbreakable” codes by terrorists and narcotraffickers.
Another method used by terrorists and narcotraffickers to avoid the
detection of compromising information is steganography. Steganography was
introduced in the HUMINT chapter as secret writing; it is more broadly defined
as the art and science of hiding information by embedding messages within
other, seemingly innocent messages. Modern steganography hides messages
inside computer files. It works by replacing bits of useless or unused data in
graphics, audio, text, or HTML files. The message often is embedded in a map or
a photograph. A digital image of a landscape, for example, might hold a
communiqué or a map. A digital song file might contain blueprints of a targeted
building. Unless the COMINT processor has some idea that digital
30
This is a continuing problem for any COMINT service that must provide
global coverage. A crisis can break out anywhere, and the translators for the
local languages can’t be stockpiled for possible future use. Because of the
security clearance issue, COMINT translators usually are not native speakers.
That drawback has not been serious for tactical military COMINT, where the
traffic is usually simple to understand. However, it can be a serious problem for
strategic COMINT, where nuances in the translation can be critical.
The chief constraint on COMINT use today is that it is labor-intensive,
relying as it does on trained linguists. Eventually, machine translation of speech
may help to ease this bottleneck, primarily in screening communications to find
the most important ones for a detailed look by a human translator.
ANALYSIS
After translation, the next phase in the processing is a detailed look by analysts.
The analysis phase requires placing the material in context (using collateral
sources and past intercepts of the same source) and adding the analyst’s
commentary. The nature of the customer and time constraints shape the depth of
analysis that is given to the material. Tactical material usually has to go on a fast
track, and the sources and customers are well known, so the process is
automated and the material may receive little or no analysis at all.
Most COMINT analysis concerns accurately assessing the content of the
communications. As a starting point, the analyst often has to identify and deal
with concealment and deception. When using cell phones or the Internet, targets
may talk around a topic, often by using prearranged code. The 9/11 attackers
communicated openly and disseminated information using prearranged code
words. For instance, the “faculty of urban planning” meant the World Trade
Center, and the Pentagon was referred to as the “faculty of fine arts.”
Mohammed Atta’s final message to the 18 other terrorists who conducted the
9/11 attacks read, in code: “The semester begins in three more weeks. We’ve
obtained 19 confirmations for studies in the faculty of law, the faculty of urban
planning, the faculty of fine arts, and the faculty of engineering.” The number
32
19, of course, referred to the number of cell members who were to board the four
aircraft.
Customers often object to this analysis step, arguing that it slows the
dissemination process. But for strategic COMINT, bypassing the analysis is a
major mistake. Raw COMINT can be misleading.
Prime Minister Winston Churchill, reading Field Marshal Erwin Rommel’s
decrypted cables during World War II, concluded that the Germans were
desperately short of supplies in North Africa. Basing his interpretation on this
raw COMINT traffic, Churchill pressed his generals to take the offensive against
Rommel. Churchill did not realize what his own intelligence analysts could have
readily told him: Rommel consistently exaggerated his shortages in order to
bolster his demands for supplies and reinforcements.33
More recently, Secretary of State Colin Powell used three NSA intercepts
during his 2003 UN presentation to “prove” the U.S. contention that Iraq was
concealing its possession of weapons of mass destruction (WMD). All three
intercepts were ambiguous. One discussed “modified vehicles” that supposedly
were used in WMD development. A second intercept allegedly involved an order
to “clean out” an ammunition depot. The third was an order to “remove the
expression ‘nerve agents’ wherever it comes up in the wireless instructions.”
Subsequent evidence showed that all three intercepts were connected with the
Iraqi attempts to purge evidence about their past WMD programs, in a futile
attempt to avoid giving the United States a cause to invade. Had the ambiguous
34
intercepts been collated with other COMINT and collateral sources, it is likely
that their actual meaning could have been determined before the Powell
presentation.
So raw COMINT, as the above examples illustrate, can be misinterpreted by
its customers. But the COMINT analysis step can also introduce distortions in
the message. In practice, the translator is also the analyst, and therein exists a
potential for bias. Analysts want to have their material read and used. They
know that interesting or provocative material is more likely to be read and used.
So a natural tendency is to exaggerate the importance of their reporting, and
even veteran COMINT analysts can fall into this trap.
The preceding material has discussed content analysis. But two analytic
techniques are not concerned with content. They are signature analysis and
traffic analysis; both are usable even on encrypted communications.
fibers will have fine-grained differences in the signals they transmit. If these
differences can be measured, then a unique signature can be established for each
piece of communications equipment.
Furthermore, consumer electronics are providing more unique signatures
that can be associated with an individual. As these devices infiltrate our personal
and professional lives—Wi-Fi, Bluetooth, BlackBerrys, iPads, smart watches,
and GPS devices—we are increasing the number of possible RF signatures that
together can create a unique pattern. By passively monitoring the signatures
generated by a person’s devices, a statistical correlation can be drawn not only to
infer the identity of the person but also to track the person.
36
• frequent communications from one node can tell the traffic analyst who’s in
charge or the control station of a network;
• correlating who talks when can indicate which stations are active in
connection with events;
DISSEMINATION
COMINT dissemination involves (1) getting the material to the right customers,
on time, so that it can be used, and (2) protecting the source. The most time-
sensitive and important COMINT is that associated with a developing crisis such
as an attack or the loss of a ship or aircraft. NSA has long had a capability to
provide fast-response reporting of COMINT associated with a crisis. The formal
structure for doing this is called the CRITIC system. 37
The tagging process discussed earlier helps in getting the material to the
right customers. Dissemination is largely by cable, and tags, topic words, or
keywords in the cable help end users to search for relevant COMINT traffic.
Battlefield Dissemination. With large armies in the field, getting the COMINT
reporting to the right level has long been a problem, especially in a fast-moving
combat situation. The U.S. military, during the 2003 invasion of Iraq, found it
possible to get intercepts to army and corps commanders expeditiously. It proved
more of a problem to get the intercepts to division commanders and their
subordinates—though when the information could be gotten to division and
battalion commanders, it often was instrumental in avoiding ambushes and
identifying opportunities for attack. Part of the problem lies in getting the
38
secure communications capability down to lower levels in the field. Another part
is the necessity to protect the source, discussed next.
As was the case with Ultra, exceptionally sensitive material usually has
special code words, and only a limited set of people have the code word access.
COMINT managers have to deal with the trade-off of getting the information to
customers without risking loss of the source. There are good reasons for such
protection. Valuable sources have been lost as a result of careless use of
COMINT by customers. As noted earlier, the U.S. ability to read Soviet leaders’
mobile radio traffic was lost after being disclosed by newspaper columnist Jack
Anderson in 1971. Reportedly, Osama bin Laden stopped using his cell
40
telephone after a 1998 article in the Washington Times disclosed that the United
States was monitoring it.
Soviets had their own COMINT liaison; they worked closely with Cuba and
their East European partners. Cuba provided them with particular COMINT
advantages because of its geographic proximity to the United States.
Liaison usually relies on the parties having a long-term common interest,
for example, in combating terrorism. Some allies have special interests—the
United Kingdom obviously is more focused on European affairs than Australia,
which is more focused on Asian affairs. These two countries have a vested
interest in taking responsibility for those respective parts of the COMINT
processing and exploitation load. Absent that common interest, though, it can be
difficult to get liaison cooperation. A country with businesses that are profiting
from gray arms traffic likely won’t help in combating such traffic, for example.
Obviously, sharing has its risks. There is always a possible concern about
liaison partners spying on each other. This has not been a problem with the Five
Eyes partners; basically, they don’t spy on each other. But as the
counterintelligence people point out, there are no friendly intelligence services,
only intelligence services of friendly countries. And the Soviet KGB did spy on
its East European allies.
A more serious problem is that other intelligence services can have moles
from unfriendly countries. Sharing then results in loss of sources. Even absent
the mole, the other service can have breaches in security, as the following
example illustrates.
In World War II, German General Erwin Rommel was called the “Desert
Fox” for his repeated tactical victories over the British in North Africa. His
successes were helped by knowing exactly what the British were going to do,
allowing him to time his counterstrokes for maximum effect. His source was
American Army Colonel Bonner Frank Fellers, liaison to the British forces.
Fellers’s communications were being intercepted and read by the Germans. His
messages were sent by radio, encrypted in the Black Code of the U.S. State
Department. The details of this code were stolen in a burglary of the U.S.
Embassy in Italy by Italian spies in September 1941; the code was also broken
by German cryptanalysts, who read the Black Code messages Fellers sent from
Cairo and provided them immediately to Rommel. 43
Another concern is the possibility that a sharing partner can turn on you.
That happened subsequent to the Iranian revolution in 1978, and the United
States lost some sources and methods then. Chances are that the Five Eyes
partners won’t turn on each other, but they do have different goals. And the
problem would be worse for the United States in sharing with countries such as
Saudi Arabia; they could help with COMINT, but you’d have to be concerned
about them shaping any intercepts to further their own goals.
Another problem in sharing is that your connections with one country can
sour your connections with another. A country wishing to share with both
Pakistan and India, or with both Israel and Egypt, would have a problem
diplomatically because of their history of mutual hostility. The solution is to
make some liaisons highly classified to avoid offending other countries.
Structure
The Introduction discussed two general ways to structure collection: stovepipe
versus collaborative and either centralized, decentralized, or a mix. We see all of
these in the world of COMINT.
The major distinction here is the sensitivity of the information that is collected.
The sources of strategic and operational COMINT often are very sensitive. They
may, for example, depend on success in breaking an encryption scheme. Such
COMINT often requires a high level of protection from unauthorized disclosure,
and distribution is limited to a relatively small group of users. The stovepipe
accommodates this protection need.
In contrast, tactical COMINT usually is disseminated to a large number of
end users, but it normally does not need the same high level of protection. A
collaborative structure works well here.
CENTRALIZED
A MIX
The usual solution is to put COMINT exploitation and analysis near the
customers for tactical and law enforcement needs. That was done in the
Iraq/Afghanistan theaters for the military and in the Drug Enforcement
Administration (DEA) example for counternarcotics COMINT. However, the
product often has to go to a widely dispersed customer set, as with
counterterrorism and counternarcotics intelligence. It then makes sense to
centralize for wide distribution. Even then, it often is possible to decentralize in
another way, sharing the processing load through liaison with other national
COMINT services, as discussed earlier.
The U.S. and British COMINT services have followed this structural
pattern—a mix—that has become more pronounced in recent years. The military
role, in both COMINT collection and analysis, increased dramatically during the
Iraq and Afghanistan conflicts.
COMMERCIAL COMINT
Summary
COMINT is the interception, processing, analysis, and reporting of an
opponent’s communications. It includes not only bugs and the traditional
microphone-and-wire but also advanced technology to collect voice, data, and
facsimile communications. COMINT is now a large-scale activity providing
customers with intelligence on diplomatic, military, economic, and scientific
developments internationally, as well as supporting law enforcement efforts
domestically. It provides insight into the plans and intentions of governments,
military forces, and criminals. It tracks the movements and funding of terrorists
and narcotraffickers. And it cues collection by other collection disciplines,
especially HUMINT and IMINT.
The COMINT process starts with a targeting phase. Up front, a COMINT
organization must select and prioritize the collection targets. There are simply
too many sources to try and collect them all. You have to select the sources that
the priority intelligence targets use. Targeting requires that you balance the
difficulty or risk of collection versus the importance of the material.
The expansion of all forms of communication in the last 50 years has
resulted in a proliferation of potential targets for COMINT. They divide into low
capacity or single channel (usually, a single voice communication on a dedicated
communications link) and high capacity or multichannel (typically, hundreds or
thousands of independent voice, data, or video communications on a
communications link). These two types of sources have to be treated differently
in planning for collection and targeting (the front end) and in the processing,
exploitation, and dissemination phase (the back end).
Microphone-and-wire intercept is an old technology, but it is still widely
used by some intelligence services. It is cheap and reliable. Unfortunately, it is
also relatively easy for counterintelligence units to find. Some microphone types
rely on structural or emplaced objects in a building to pick up sound and transmit
it through a part of the building structure.
The audio transmitter or bug also has been a useful collector for decades.
Because it transmits a radio signal rather than using a wire, it is simpler to
emplace than the mike-and-wire. Also, it is cheap and requires no great technical
skill, so it is popular among the less sophisticated intelligence organizations and
in industrial espionage.
Telephone surveillance in the past relied on identifying the telephone of
intelligence interest and placing a wiretap on it. Most telephone surveillance
today focuses on cell phone traffic because it is the preferred communications
medium of criminal groups and terrorists. Unencrypted cellular telephone
networks are an easy target for COMINT, and even encryption provides no great
level of protection. Cell phones are mobile, but they can still be located and
tracked. An individual cell phone or an entire cell tower can be targeted.
Interception can be done near the phone itself, near the tower, or at the routing
center.
Military services conduct the bulk of COMINT efforts worldwide using
trained linguists to monitor the mobile radio communications of opposing forces.
COMINT that supports ongoing operations, known as tactical COMINT, also is
used heavily in law enforcement work and in countering illicit networks
generally. Military communications in particular rely heavily on radio. HF radio
was the original target, and it is still in use today. Line-of-sight radio, called
push-to-talk, is used in military air-to-ground communications. Both types can
be intercepted over large areas.
High-capacity or multichannel communications carry a large volume of
material of intelligence interest:
NOTES
1. National Security Council Intelligence Directive No. 6, National Security Council of the United States (17 February 1972, first issued in 1952).
2. U.S. Congress, Technologies Underlying Weapons of Mass Destruction, OTABfP-ISC-115 (Washington, DC: U.S. Government Printing Office, December 1993) 43.
3. Christopher Andrew and Vasili Mitrokhin, The Sword and the Shield (New York: Perseus Books, 1999), 95.
4. F. W. Winterbotham, The Ultra Secret (New York: Dell, 1974).
5. NSA/CSS, “Pearl Harbor Review—The Black Chamber,” accessed 21 September 2012 at
http://www.nsa.gov/about/cryptologic_heritage/center_crypt_history/pearl_harbor_review/black_chamber.shtml.
6. John Wingfield, Bugging (London: Robert Hale Ltd., 1984), 21–22.
7. “Laser Microphone” (December 22, 2007), accessed 23 September 2012 at www.bobjunior.com/project/laser-microphone/.
8. John M. McConnell, “The Evolution of Intelligence and the Public Policy Debate on Encryption,” Seminar on Intelligence, Command and Control, Center of Information Policy Research
(Cambridge, MA: Harvard University School of Government, January 1997), 151.
9. “Wireless Eavesdropping—Not Just for Intelligence Peeps Anymore,” Infosecurity (November 12, 2010), accessed 21 September 2012 at
http://www.infosecuritymagazine.com/view/13953/wireless-eavesdropping-not-just-for-intelligencepeeps-anymore.
10. Ibid.
11. Mark Bowden, “A 15-Month Manhunt Ends in a Hail of Bullets,” Philadelphia Inquirer (December 17, 2000).
12. Andrew and Mitrokhin, The Sword and the Shield, 344.
13. Matthew M. Aid, The Secret Sentry (New York: Bloomsbury Press, 2009), 266–267.
14. “Chocktaw Code Talkers of WWI,” accessed 21 September 2012 at https://pantherfile.uwm.edu/michael/www/choctaw/code.htm.
15. A. Quazi and W. Konrad, “Underwater Acoustic Communications,” IEEE Communications Magazine (March 1982), 24–29.
16. For more information, see Wilhelm Flicke, War Secrets in the Ether (Laguna Hills, CA: Aegean Park Press, 1994), 4–12.
17. Dino Brugioni, Eyeball to Eyeball: The Inside Story of the Cuban Missile Crisis (New York: Random House, 1990), 560.
18. Ibid.
19. Nicky Hager, “Israel’s Omniscient Ears,” Le Monde diplomatique (September 4, 2010).
20. Swiss Federal Department of Defense (September 6, 2007) (in French) accessed 21 September 2012 at Project ONYX réalisé : la Délégation des Commissions de gestion et l’Autorité de
contrôle indépendante contrôlent sa conformité au droit.
21. L. Britt Snider, “Recollections from the Church Committee’s Investigation of NSA,” CSI Studies in Intelligence (Winter 1999–2000), accessed 21 September 2012 at
https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/winter99–00/art4.html.
22. Sherry Sontag and Christopher Drew, Blind Man’s Bluff (New York: HarperCollins, 1998), 98.
23. Hager, “Israel’s Omniscient Ears.”
24. Duncan Campbell, “Interception Capabilities 2000,” A report to the Director General for Research of the European Parliament, April 1999, accessed 21 September 2012 at
http://www.fas.org/irp/eprint/ic2000/ic2000.htm.
25. Hager, “Israel’s Omniscient Ears.”
26. Ibid.
27. Andrew and Mitrokhin, The Sword and the Shield, 43–45.
28. Ibid., 143.
29. James D. Fornfischer, The Last Stand of the Tin Can Sailors (New York: Bantam Dell, 2004), 213.
30. United States Institute of Peace, “Terror on the Internet: Questions and Answers,” accessed 21 September 2012 at http://www.usip.org/publications-tools/terrorinternet/terror-internet-
questions-and-answers.
31. Aid, The Secret Sentry, 220.
32. United States Institute of Peace, “Terror on the Internet: Questions and Answers.”
33. Michael Herman, Intelligence Power in Peace and War (Cambridge, MA: Cambridge University Press, 1996), 96.
34. Aid, The Secret Sentry, 243–244.
35. U.S. Federal Highway Administration, “Assessment of Automated Data Collection Technologies for Calculation of Commercial Motor Vehicle Border Crossing Travel Time Delay”
(April 2002), accessed 21 September 2012 at http://ops.fhwa.dot.gov/freight/freight_analysis/auto_tech/sect_2a.htm.
36. George Spafford, “Underlying Patterns Can Reveal Information Security Targets,” SearchSecurity.com, accessed 21 September 2012 at
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1193714,00.html.
37. NSA, “Cryptologic Almanac 50th Anniversary Series: The Formation of NSOC,” accessed 2 October 2011 at
http://www.nsa.gov/public_info/_files/crypto_almanac_50th/the_formation_of_nsoc.pdf.
38. Aid, The Secret Sentry, 258–262.
39. F. W. Winterbotham, The Ultra Secret: The Inside Story of Operation Ultra (Bletchley Park and Enigma, London: Orion Books Ltd, 1974).
40. Aid, The Secret Sentry, 152.
41. Duncan Campbell, “Interception Capabilities 2000.”
42. Matthew M. Aid, “In the Right Place at the Right Time: US Signals Intelligence Relations with Scandinavia, 1945–1960,” Journal of Strategic Studies, Vol. 29, No. 4 (August 2006),
575–605.
43. HistoryNet.com, “Intercepted Communications for Field Marshal Erwin Rommel,” accessed 21 September 2012 at http://www.historynet.com/intercepted-communications-for-field-
marshal-erwin-rommel.htm.
44. Andrew and Mitrokhin, The Sword and the Shield, 337.
45. CIA, “Family Jewels” declassified document (May 16, 1973), 544–546, accessed 21 September 2012 at
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB222/family_jewels_full_ocr.pdf.
46. Aid, The Secret Sentry, 305.
47. Shaun Waterman, “Surveillance Tools: Not Just for Spies Now,” Washington Times (December 5, 2011), accessed 21 September 2012 at
http://www.washingtontimes.com/news/2011/dec/5/surveillance-tools-not-just-for-spies-anymore/.
5. Cyber Collection
The best that the defender can do is to make a collection effort more difficult and
expensive or slow it down. Winning in the long term is not an option.
Attackers are helped in their efforts by the mindset of the defenders, by the
complexity of computer networks, and occasionally by simple human error:
secure system. The cyber collectors know better. The motto of the hacker is, “If
there is a flaw in the security, we’ll find it.” Computer security programs tend to
3
Up to this point, we’ve been using the word attack to mean hacking a
computer or network for any purpose. But this chapter is not about cyber
activities known variously as information operations, cyber operations, or
computer network attack (CNA). CNA operations are conducted by military
forces and hackers with the intent to degrade, disrupt, deny, or deceive. The
effects of CNA typically are readily observed. Instead, we’re talking about
collection operations where the computer or network continues to function
normally. In the remainder of the chapter, attack means CNA; we’ll use
collection or espionage to describe cyber collection.
There are two general types of cyber collection: computer network
exploitation, or CNE, and direct or indirect exploitation of a single computer or
an intranet (a privately maintained computer network that requires access
authorization). The following sections describe some commonly used techniques
for exploiting both networks and single computers in intelligence. Because this
is a rapidly changing and highly technical field, these descriptions are of
necessity cursory.
Function
This section deals with the targets of cyber collection and the benefits that accrue
to the collector.
For technically advanced countries such as Russia, China, Israel, and
France, operations aimed at networks and computers may have become the most
productive source of intelligence. One reason is the sheer volume and diversity
of useful information that is available on computers. This includes not only
information of direct intelligence value, such as military posture, plans, and
economic data, but also information that can help in targeting other collection
assets. Personnel data, for instance, can be acquired by targeting online
employment search sites. The resumes on these sites often give details about
classified programs and provide personal details that assist in the targeting of
individuals for COMINT operations or for recruitment as HUMINT sources. 5
Much of this falls into the realm of open source, but some materials require
sophisticated CNE to acquire.
Another reason for the rising importance of cyber collection is the relatively
low risk involved in obtaining it. The U.S. National Counterintelligence
Executive reportedly has posed this question: “If you can exfiltrate massive
amounts of information electronically from another continent, why risk running
a spy?” Dr. James A. Lewis, director of the Technology and Public Policy
Program at the Center for Strategic and International Studies, has put it
succinctly:
repression, appears to be both a victim of CNE and CNA by the government and
an instigator of cyber attacks on the government. 10
Iran has been a target of highly publicized attacks and is a target for cyber
collection as well. During 2009 and 2010, Iran’s Natanz nuclear facility
reportedly was infected with a destructive malware called Stuxnet (discussed
later). During 2011, a variant of that malware called Duqu (named for a Star
Wars villain) was discovered. Duqu exploited a vulnerability of Microsoft Word
and appears to have been aimed at highly specific targets in Iran and Sudan. In
contrast to the attack design of Stuxnet, Duqu apparently was designed purely
for cyber collection against specific targets in those countries.
11
the Web, and the fact that it is an intranet tends to give its users a false sense of
security. The North Koreans who have access to both the Web and Kwangmyong
can (intentionally or unintentionally) create a path for exfiltration of data taken
from computers on the intranet.
Less developed countries are even easier targets for cyber espionage than
these three. Their governments are generally less sophisticated in cyber defense,
and more cyber sophisticated countries probably exploit their technological
advantage to routinely obtain political, economic, and military intelligence from
the Internet, intranets, and stand-alone devices, much as they exploit their edge
in COMINT. The less developed countries are also targets for another reason.
Their governments and their commercial enterprises provide soft entry points for
collection about third party governments that are hard targets. For example, a
Western European government, no matter how secure its cyber systems, might
lose sensitive details about its diplomatic dealings with a country in sub-Saharan
Africa, thanks to the weak cyber protections in the latter’s computer network.
Process
Cyber collection is aimed at a rich and rapidly growing set of hardware and
software targets, the major categories being
• computers and intranets with Internet connection, including tablets and smart
phones;
• intranets that aren’t connected to the Internet, such as military networks; and
There are numerous ways to exploit target networks. Collectors must first gain
access to the target network, have tools to exploit it, and remove any evidence of
the operation. Collectors can exploit a vulnerability that occurs in the network or
is presented by the supply chain. They can masquerade as an authorized user or
use human assets to gain physical access to the network. Once they gain access,
they usually leave behind a software implant called a backdoor. The implants
communicate back to the controlling organization, allowing collectors to acquire
data from the network. The process can be summed up in five steps:
Alternatively, the email may direct the target to a website that contains the
backdoor, with much the same outcome. Such a website is called a driveby
download site. It typically relies on vulnerabilities in web browsers and browser
add-ons. Users with vulnerable computers can be infected with malware simply
by visiting such a website, even without attempting to download anything. 15
Sustained collection makes use of a number of tools that are known in the
business as exploits. An exploit takes advantage of software vulnerabilities to
infect, disrupt, or take control of a computer without the user’s consent and
preferably without the user’s knowledge. Exploits take advantage of
vulnerabilities in operating systems, web browsers, applications, or other
software components. The preferred target of exploits changes constantly as
17
vulnerabilities are found and corrected in all of these targets. For example,
exploitation of the Adobe Flash Player had been quite low until 2011, when it
suddenly became a major target. Adobe provided patches and updates
throughout 2012 to eliminate the vulnerabilities, only to encounter new versions
of malware as hackers went after the patched versions and even moved to place
Trojans (discussed below) on mobile versions of Flash Player. 18
Four of the most widely known exploits are Trojan horses (usually
abbreviated “Trojans”), worms, rootkits, and keystroke loggers.
While all of these exploits can be used for cyber espionage, they are most
effective when they are used against a zero-day vulnerability. Also called a zero-
hour or day zero vulnerability, this is an application vulnerability that is
unknown to defenders or the software developer. It derives its name from that
time (called the zero hour or zero day) when the software developer first
becomes aware of the vulnerability. Until that moment of awareness, the
developer obviously cannot develop a security fix or distribute it to users of the
software. Zero-day exploits (the software that uses a security gap to carry out an
intrusion) are highly valued by hackers and cyber espionage units because they
cannot be effectively defended against—at least not until sometime after zero
day arrives.19
Collection via the Web requires more than the deployment of these exploits.
The cyber espionage organization must control the exploits and use them to
obtain the desired information while maintaining the secrecy, or at least the
deniability, of the operation. Often, this is done by a device called a botnet. The
controller of a botnet is usually referred to as a command-andcontrol (C&C)
server. It issues instructions to the botnet, which directs the activities of infected
computers (referred to as zombies) through communication channels such as
Internet Relay Chat or HTTP. The botnet’s command-and-control server can’t be
easily shut down because it’s hard to determine its real location.
Figure 5.1 shows the sources (distribution sites) of malware infections
worldwide logged by Microsoft security monitoring systems during the fourth
quarter of 2011. The graphic, taken alone, does not tell the full story; many of
20
the sites are intermediaries, the actual attack being launched from another site,
usually in another country. Canada and the Middle East, for example, are more
likely transit points for attacks rather than being sources.
Comparing the attack site distribution with the locations of malware
infections (Figure 5.2) reinforces a point made earlier in this chapter: Countries
lacking a high level of cyber expertise are generally more vulnerable to malware.
When a hacker enters a system, as the following examples illustrate, the
victim usually cannot identify the real source or purpose of the intrusion.
In 1999 and 2000, unidentified hackers downloaded scores of “sensitive but
unclassified” internal documents from computers in the Department of Defense
and in the Los Alamos and Lawrence Livermore labs. The effort was traced to a
foreign country whose officials denied being involved, but the intrusions
suddenly stopped. 21
FIGURE 5.1 Malware Distribution Sites during the Second Quarter of 2011
A network that is physically isolated from the Internet (an intranet) or a single
computer that never connects to the Internet requires a different type of effort
from that used in CNE. The collector has to gain access to the computer or the
intranet in some way. Once access has been gained through a network jack or
cable, a utility closet, or some similar device, almost anything can be done. From
the defense point of view, the game is over and the defense has lost.
One of the simplest targets is a personal notebook computer that is carried
on trips or to conferences. With a few minutes of uninterrupted access, a
collector can download the contents of a notebook’s hard drive. Computers or
any devices containing electronic storage—separate hard drives or USB flash
drives, for example—can legally be searched when they are taken across
international borders, and they often are. Encrypting the material does not
provide protection. Customs officials can demand the encryption key, deny the
traveler entry to their country, or confiscate the computer. In many cases,
customs officials are looking for terrorist material, pornography, or hate
literature, but countries that have a reputation for commercial espionage also are
likely to make intelligence use of the material acquired.
Gaining entry to a notebook computer provides the collector with onetime
access. But if it is expected that the notebook will later be connected to an
intranet, the collector can place a backdoor in the computer.
In cases where computers and intranets never leave a secure facility, and
where remote access is not possible, it is necessary to use field operations to
access networks. This category encompasses deployment of any CNE tool
through physical access or proximity. In intelligence, these are called HUMINT-
enabled operations; in the world of hackers, they are usually referred to as social
engineering. They encompass such classical HUMINT techniques as gaining
24
intranets are equipped with wireless devices, for example, for wireless keyboards
or mice or for communicating with wireless printers. Unless the wireless
capability is disabled, this represents a vulnerable point for entry to the intranet.
Products to support cyber espionage against wireless devices are available
worldwide. Gamma International, a U.K.-based firm, provides one of many such
tools. Called Finfisher, it can be used to enter wireless networks, smart phones,
computers, and cell phones or to intercept Skype communications and obtain
encryption passwords. One of its features is the ability to send a fake iTunes
update to targets to infect their computers with the company’s surveillance
software. The company offered to sell Finfisher to Hosni Mubarak’s secret
police in Egypt, prior to Mubarak’s overthrow by protesters during 2011. 27
An infected USB flash drive inserted into a Defense Department (DoD) laptop
computer in 2008 was claimed to cause “a significant compromise” of the DoD
classified computer networks. The flash drive’s exploit, subsequently named
Agent.btz, moved onto a network run by the U.S. Central Command. Once that
28
network became infected, any thumb drive used on the machine acquired a copy
of the malware, ready for propagation to other computers and networks. Possibly
as a consequence, the exploit subsequently infected two classified networks as
well as some unclassified ones. The Secret Internet Protocol Router Network
(SIPRNet), which the Defense and State departments use to transmit material of
no higher than Secret classification, was infected. Agent.btz also infected the
Joint Worldwide Intelligence Communications System (JWICS), which carries
material classified Top Secret.
29
The compromise received a great deal of publicity. DoD claimed that it was
the most significant breach to U.S. military computers in history. The code had
been used before by Russian hackers, leading DoD authorities to claim that a
Russian intelligence service was behind the effort. But the circumstances
30
surrounding the Agent.btz incident make this seem unlikely. To conduct cyber
collection, the malware would have had to communicate with a command-and-
control computer for instructions on what files to remove and how to transmit
them. But SIPRNet and JWICS have at best very limited (and closely monitored)
connection to the public Internet. Without that connection, an intruder would
have had no way of exploiting the access provided by Agent.btz. In fact, the
intruder wouldn’t even have been able to determine that Agent.btz had found its
way into the CENTCOM network.
The subsequent removal of Agent.btz was an expensive and timeconsuming
process. But the exploit itself was relatively crude by the standards of a
sophisticated foreign intelligence service, especially the absence of an adequate
exfiltration mechanism, noted above. The following examples illustrate what a
CNE exploit should look like.
STUXNET
FLAME
During 2012, malware was discovered that appears to have targeted Microsoft
Windows computers in the Middle East for intelligence purposes. Called Flame,
it reportedly had been operating for five years in these countries. Flame is more
37
powerful and flexible than Stuxnet and has a number of features that illustrate
the level of sophistication and precise targeting that is possible today in cyber
collection:
• It allows the controlling entity to add new malware at any time for targeted
collection.
no one has come forward to accept the award.) Figure 5.3 shows the locations
and the number of computers found by Kaspersky Lab to be infected by Flame. 40
The infections found in Israel and the West Bank are not distinguished in the
Kaspersky data, but based on the overall infection pattern, they most likely are
concentrated in the Palestinian regions of the West Bank.
GAUSS
During 2012, Kaspersky Lab identified a new cyber collection toolkit that
appears to have been created by the same government that developed and
deployed Flame. Called Gauss, it has many similarities to Flame: their
architecture, module structures, and method of communicating with command-
and-control servers are strikingly similar. The owners of the Gauss command-
and-control server shut it down shortly after Kaspersky Lab announced its
discovery.
Gauss is an example of a highly targeted intelligence collector. It infected
personal computers (PCs) primarily located in Lebanon and stole browser
history, passwords, and access credentials for online banking systems and
payment websites from its targets. Kaspersky Lab identified more than 2,500
infections and estimated that the total infections numbered in the tens of
thousands.
Based on the Kaspersky analysis, it appears that the targeting was intended
to collect intelligence about financial transactions. The targets included a number
of Lebanese banks including the Bank of Beirut, EBLF, BlomBank,
ByblosBank, FransaBank, and Credit Libanais. Gauss also targeted specific
Citibank and PayPal accounts. 41
Technology has allowed us to hide malware in many places, and the supply
chain (all the way from component manufacturer to end user) is a very attractive
place. Anyone in the supply chain before sale has the access necessary for
inserting malware in a computer or other electronic device. Such embedded
malware is very difficult to detect, and most purchasers do not have the
resources to check for such modifications.
Even better than getting access to a target’s computer is to manufacture the
computer. The hardware can be modified in ways that are not readily detectable
but that allow an intelligence service to gain continuing entry into the computer
or communications system. Targeted components can be add-ons that are
preinstalled by the computer manufacturer before the computer is sold. A user
may not even use the vulnerable add-on or be aware that it is installed. Malware
43
inserted in a computer before sale can call home after being activated, exfiltrate
sensitive data, allow remote control of the computer, and insert Trojan horses
and worms. Such backdoors are not limited to software installed on the
computer. Hardware components such as embedded radio frequency
identification (RFID) chips and flash memory can be the sources of such
malware.
Much of the hardware that goes into computers and telecommunications
systems sold worldwide is now made in countries such as China. In July 2011, in
testimony before the House of Representatives’ Oversight and Government
Reform Committee, a senior Department of Homeland Security official testified
that electronics sold in the United States are being preloaded with spyware,
malware, and security-compromising components. The principal source of the
malware is believed to be China. 44
• Its main feature was the Nitol virus, which is used to steal personal
information and uses an infected computer as a zombie to carry out
distributed denial of service attacks that flood websites with traffic and make
them unreachable. Nitol also provides a backdoor so that additional malware
can be loaded onto the infected machine whenever it is connected to the
Internet.
Computers infected with the Nitol virus were controlled through an Internet
domain called 3322.org, which had previously been linked to malicious activity.
Microsoft, after obtaining a court order in September 2012, took control of the
domain and blocked its operation. 46
COLLECTING EMANATIONS
Structure
A structural debate exists within the United States and other countries, having to
do with the nature of cyber operations generally. Computer network exploitation
and computer network attack overlap, in much the same way that electronic
warfare and signals intelligence (SIGINT) overlap. The same capabilities are
used for both CNE and CNA. Both require some way of getting into the target
network or computer. Very similar malware is used for both, the difference being
in what the malware does after it is introduced into the target network or
computer. Furthermore, defense against both CNE and CNA employs many of
the same skills. So one view is that all offense (CNE and CNA) and cyber
defense should be housed within the same organization.
The United Kingdom appears at the moment to have such a centralized
structure. The Government Communications Headquarters (GCHQ), the British
COMINT organization, has the assignment to defend against cybercrime and
cyber espionage. It also probably has the cyber offense role as well (CNE and
CNA). But there are plans to separate criminal from other cyber activity, by
putting cybercrime in the new National Crime Agency. So the United Kingdom
47
may be moving toward the same division of responsibilities that the United
States has, as discussed below.
Within the United States, the assignment of cyber responsibilities is
complex and is likely to remain so. The Defense Department has a responsibility
for CNE and CNA against opposing military forces and for cyber defense against
such forces. To carry out that responsibility, during 2010 it put in place the U.S.
Cyber Command under the Strategic Command (STRATCOM), with the
Director of the National Security Agency (NSA) as the commanding officer.
Each service has a component within the Cyber Command: the 24th Air Force,
Army Forces Cyber Command, Navy’s 10th Fleet, and Marine Forces Cyber
Command.
But a division of responsibility exists between military and civilian cyber
operations in the United States. In April 2011, General Keith Alexander,
Director of NSA, identified his major concern in a speech in which he said that
“my mission as commander of U.S. Cyber Command is to defend the military
networks… I do not have the authority to look at what’s going on in other
government sectors, nor what would happen in critical [U.S.] infrastructure. That
right now falls to DHS.” Department of Homeland Security (DHS) Secretary
Janet Napolitano responded in a speech in which she made the point that “at
DHS, we believe cyberspace is fundamentally a civilian space.” 48
budget dollars ride on the decisions, the debate is likely to continue for some
time. And as the earlier example of Microsoft’s collecting infected computers
illustrates, the commercial sector has a role to play as well.
The Chinese framework for cyber collection provides a contrast to the U.K.
and U.S. structures. And it appears to be an analogue to the Chinese approach to
HUMINT: deploy large numbers of collectors against large numbers of targets,
discarding subtlety in favor of volume. A complex collaborative relationship
exists among Chinese hackers, industrial enterprises, and the Chinese
government. The government recruits from among the Chinese hacker
community, and consulting relationships exist between hackers and security
services. Both the government and industrial enterprises engaged in cyber
espionage get custom malware from the hacker community. 50
As it did with HUMINT, China must find a way to make use of the cyber
intelligence that it obtains. Because it conducts so many successful cyber
collections, the Chinese problem lies in collating the mass of intelligence that
they collect. That would seem to be a problem any intelligence service would
like to have—until it actually must deal with it.
Cyber collection shares a structural feature with HUMINT and open source:
many people can do it—witness the large number of freelance hackers and the
number of China-based collection attempts. But the best of these people are
incredibly good; they give their employers a huge edge in collection. If you
select at random a group of experienced software programmers, according to
experts in the field, the best in the group will be between 10 and 28 times more
effective than the mediocre ones. Assuming that this ratio translates over to the
51
hacker world, the best in the cyber collection business should be far better than
the average.
The U.S. media provides almost daily hyperbole about the West being
“stolen blind” by cyber espionage, especially by China. The real threat may be
quite different. One informal survey of cyber collection professionals indicated
that they believe China deploys large numbers of aggressive and highly visible
cyber collectors, but Russia uses more skilled and professional ones. The best in
the business, according to this group, are the NSA and Britain’s GCHQ. In 52
Summary
Cyber collection is not about what is variously called information operations,
cyber operations, or computer network attack—those activities that involve
attacks on computers and networks to degrade, disrupt, deny, or deceive. Cyber
collection is about operations in which the computer or network continues to
function normally. It divides into two basic types: computer network
exploitation, also known as remote access collection, and direct access
operations. Cyber collection also is not about searching the Internet, which was
covered in Chapter 2. Instead, it is about collection against protected systems,
though the World Wide Web often is a channel for such collection.
Cyber collection is a valuable source of sensitive intelligence for many
countries, and it is a profitable enterprise for many criminal groups as well. Both
use techniques that are widely known as hacking to obtain intelligence from
computers and data networks. Cyber collection is popular, in part, because of the
sheer volume of useful information that is available on computers. It is attractive
also because there is relatively little risk involved in obtaining it.
The discussions of cyber collection and cyber attack in the literature take
the view of the defense and consequently are pessimistic. When viewed from the
collector’s perspective, the picture is much brighter. As in other areas of strategic
conflict, the attacker (here, the collector) has the advantage. The defense must
defend against all possible forms of attack. The collector need only select one
vulnerability. And the collector has time working for him.
Collectors are helped in this process by the mindset of the defenders and by
the complexity of computer networks: Complexity equates to vulnerability.
Hardware and software changes, patches, and upgrades, along with poor
configuration control, all open vulnerabilities that collectors can exploit.
Cyber collectors have to get either electronic or physical access to the target
computer or network, have tools to exploit it, and remove any evidence of the
operation. There are typically five steps in the process:
NOTES
1. Quoted in Kevin D. Mitnick and William L. Simon, The Art of Intrusion (Indianapolis, IN: Wiley, 2005), 115.
2. Ibid., 43.
3. Ibid.
4. Ibid., 62.
5. Kevin G. Coleman, “Cyber Espionage Targets Sensitive Data” (December 29, 2008), accessed 21 September 2012 at http://sip-trunking.tmcnet.com/topics/security/articles/47927-cyber-
espionage-targets-sensitive-data.htm.
6. James A. Lewis, Center for Strategic and International Studies, Testimony before the House of Representatives Committee on Oversight and Government Reform Subcommittee on
National Security, Homeland Defense and Foreign Operations on “Cybersecurity: Assessing the Immediate Threat to the United States” (May 25, 2011), accessed 21 September 2012 at
http://csis.org/files/ts110525_lewis.pdf.
7. Seymour M. Hersh, “The Online Threat,” The New Yorker (November 1, 2010), 44–55.
8. Elinor Mills, “Microsoft: Trojans Are Huge and China Is Tops in Browser 8. Elinor Mills, “Microsoft: Trojans Are Huge and China Is Tops in Browser 10080428-83.html.
9. Shaun Waterman, “Chinese Databases Exposed To hackers,” Washington Times (April 26, 2011), accessed 21 September 2012 at
http://www.washingtontimes.com/news/2011/apr/26/chinese-databases-exposed-to-hackers/.
10. Ellen Nakashima and William Wan, “Chinese Denials about Cyberattacks Undermined by Video Clip,” Washington Post, (August 4, 2011), accessed 21 September 2012 at
http://www.washingtonpost.com/world/national-security/state-media-video-candidly-depicts-chinas-developing-cyber-weaponry/2011/08/22/gIQAqyWkbJ_story.html.
11. R. M. Schneiderman, “New Computer Malware May Presage Another Cyberattack, Potentially on Iran,” The Daily Beast (November 16, 2011), accessed 21 September 2012 at
http://www.thedailybeast.com/articles/2011/11/16/new-computer-wormmay-presage-another-cyber-attack-potentially-on-iran.html.
12. Sangwon Yoon, “Is the Inter-Korean Conflict Going Cyber?” Al Jazeera (June 24, 2011), accessed 21 September 2012 at
http://www.aljazeera.com/indepth/features/2011/06/20116206572748130.html.
13. John McAfee and Colin Haynes, Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System (New York: St. Martin’s Press, 1989), 79.
14. Bryan Krekel, “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation,” Northrup Grumman Corporation (October 9, 2009),
accessed 21 September 2012 at http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_160ct2009.pdf.
15. Microsoft Security Intelligence Report, Vol. 12, accessed 16 September 2012 at http://www.microsoft.com/security/sir/default.aspx.
16. Joint Report JR03-2010, “Shadows in the Cloud: Investigating Cyber Espionage 2. 0,” Joint report of the Information Warfare Monitor and Shadowserver Foundation (April 6, 2010),
accessed 21 September 2012 http://www.scribd.com/doc/29435784/SHADOWS-IN-THE-CLOUD-Investigating-CyberEspionage-2-0.
17. Microsoft Security Intelligence Report, Vol. 12.
18. Ben Weitzenkorn, “Adobe Flash Player Hit by Hackers on Both Ends,” Security News Daily, accessed 21 September 2012 at http://www.securitynewsdaily.com/2191-adobe-flash-player-
iphone-android.html.
19. Microsoft Security Intelligence Report, Vol 12.
20. Ibid.
21. Association of Foreign Intelligence Officers (AFIO) Weekly Intelligence Note 36-02 (September 9, 2002), available from the association by contacting afio@afio.com.
22. Ibid.
23. JU03–2010, “Shadows in the Cloud.”
24. Mitnick and Simon, The Art of Intrusion, Chapter 10.
25. “War in the Fifth Domain,” The Economist (July 1, 2010), accessed 21 September 2012 at http://www.economist.com/node/16478792?story_id=16478792.
26. Microsoft Security Intelligence Report, Vol. 12.
27. Kim Zetter, “Spy Firm Videos Show How to Hack WiFi, Skype, and Email,” Wired (December 8, 2011), accessed 21 September 2012 at http://www.wired.com/threatlevel/2011/12/spy-
firm-videos/.
28. William J. Lynn III, “Defending a New Domain,” Foreign Affairs (September/October 2010), accessed 21 September 2012 at http://www.foreignaffairs.com/articles/66552/william-j-
lynn-iii/defending-a-new-domain.
29. Ellen Nakashima, “A Cyber-Spy Is Halted, but Not a Debate,” Washington Post (December 9, 2011), 1.
30. Lisa Daniel, “Lynn Outlines Cyber Threats, Defensive Measures,” American Forces Press Service (August 25, 2010), accessed 21 September 2012 at
http://www.defense.gov/news/newsarticle.aspx?id=60600.
31. John Markoff, “Malware Aimed at Iran Hit Five Sites, Report Says,” New York Times (February 11, 2011), accessed 21 September 2012 at
http://www.nytimes.com/2011/02/13/science/13stuxnet.html.
32. Ibid.
33. Ibid.
34. William J. Broad, John Markoff, and David E. Sanger, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,” New York Times (January 15, 2011), accessed 21 September 2012 at
http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html?_r=1&pagewanted=all.
35. Mark Clayton, “Stuxnet Malware Is ‘Weapon’ Out to Destroy… Iran’s Bushehr Nuclear Plant?” Christian Science Monitor (September 22, 2010).
36. Ibid.
37. Damien McElroy and Christopher Williams, “Flame: World’s Most Complex Computer Virus Exposed,” Telegraph (May 29, 2012), accessed 29 May 2012 at
http://www.telegraph.co.uk/news/worldnews/middleeast/iran/9295938/Flameworlds-most-complex-computer-virus-exposed.html.
38. Ibid.
39. Leyden, “Flame Worm’s Makers Fail to Collect Epic Ownage Award.”
40. Figure created by the author from data provided by Kaspersky Lab, accessed 4 October 2012 at http://www.kaspersky.com/threats.
41. Kaspersky Lab, “Kaspersky Lab Discovers ‘Gauss’—A New Complex CyberThreat Designed to Monitor Online Banking Accounts” (August 9, 2012), accessed 4 October 2012 at
http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_and_ITU_Discover_Gauss_A_New_Complex_Cyber_Threat_Designed_to_Monitor_Online_Banking_Accounts.
42. Robert Gillette, “Sophisticated New Devices: KGB Eavesdropping Pervasive, Persistent,” Los Angeles Times (April 13, 1987), accessed 21 September 2012 at
http://articles.latimes.com/1987-04-13/news/mn-504_1_bugging-devices/3.
43. Microsoft Security Intelligence Report, Vol 12.
44. “U.S. Invokes Cold War Powers in Hunt for Chinese Telecom Spyware,” Bloomberg News (November 30, 2011), accessed 21 September 2012 at
http://business.financialpost.com/2011/11/30/u-s-invokes-cold-war-powers-in-huntfor-chinese-telecom-spyware/.
45. Jeffrey R. Jones and Mark A. Thomas, “Cyber Espionage: What’s the Big Deal?” Defense Intelligence Journal, Vol. 1, No. 1 (2009), 96.
46. Angela Moscaritolo, “Microsoft Finds Malware Pre-loaded on PCs in China,” PC Magazine (September 14, 2012), accessed 16 September 2012 at
http://www.pcmag.com/article2/0,2817,2409730,00.asp.
47. Jack Clark, “GCHQ to Take Hub Role in UK Cybersecurity,” ZDNet UK (November 25, 2011), accessed 21 September 2012 at http://www.zdnet.co.uk/news/security/2011/11/25/gchq-
to-take-hub-role-in-uk-cybersecurity-40094512/.
48. Nakashima, “A Cyber-Spy Is Halted, but Not a Debate.”
49. Ibid.
50. Krekel, “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation.”
51. See, e.g., Fred Brooks, The Mythical Man-Month; and Robert L. Glass, Facts and Fallacies of Software Engineering (Boston, MA: Addison-Wesley, 2002).
52. “War in the fifth domain.”
53. Benjamin L. Cardin, “We’re All at Risk from Cyber Attack,” Baltimore Sun (December 15, 2010), accessed 21 September 2012 at http://articles.baltimoresun.com/2010-12-14/news/bs-
ed-cybersecurity-20101214_1_cyber-criminals-cyber-crime-transnational-crime.
54. Ibid.
55. Shaun Waterman, “Surveillance Tools: Not Just for Spies Now,” Washington Times (December 5, 2011), accessed 21 September 2012 at
http://www.washingtontimes.com/news/2011/dec/5/surveillance-tools-not-just-for-spies-anymore/.
6. Overview of Nonliteral Collection
Function
Technical collection represents perhaps the largest asymmetric edge that
technologically advanced countries such as the United States and its allies have
in the intelligence business. Other countries can do as well or even better in the
collection disciplines covered in Part I. Many countries do well in human
intelligence (HUMINT), taking advantage of the relatively open societies in the
United States and Europe. Most countries have similar access to open source
collection—the openly available material that includes the Internet. Many
countries collect communications intelligence (COMINT). And cyber collection
is a cottage industry. But technical collection requires a sophisticated
technological infrastructure. Increasingly, major powers are making the
investment in satellite-based imaging systems, but most do not yet invest in the
wide range of technical collection assets that the United States uses. 1
SITUATIONAL AWARENESS
CHARACTERIZING A TARGET
Characterizing the target can have many meanings. It can mean identifying
people of intelligence interest and assessing their physical condition and
behavior. It can mean assessing the significance of activities. It includes
determining the purpose and output of a production plant and assessing an
underground or unidentified structure. Collection techniques like multispectral
thermal imaging (discussed in Chapter 10) provide valuable insights for
identifying trace gaseous emissions, such as those produced by nuclear or
chemical weapons whether in production, storage, or employment. Signatures
are used to characterize environmental features that have intelligence value—
including surface temperatures, water quality, material composition, and
pollutants.2
Process
The generic technical collection process is shown in Figure 6.1 (which is another
version of Chapter 1’s Figure 1.4). It typically has a front end, where collection
planning is done; followed by collection and a back end, where the collected
material is turned into raw intelligence.
PLANNING
Many collectors refer to the step prior to collection as tasking or targeting. But
tasking and targeting don’t adequately describe what happens in every collection
effort. Planning is a more general term, though even it doesn’t fully describe the
actions that are taken. The planning phase typically includes identifying
requirements, analyzing the target(s), developing a collection strategy, and
tasking specific collectors. The planning segment of the process is discussed in
detail in Chapter 18 for all of collection, both literal and nonliteral, and includes
the challenge of planning across collection INTS.
COLLECTION
PROCESSING
EXPLOITATION
Exploitation uses the signatures to identify patterns and establish the significance
of the material that has been collected. It is often referred to as single-source
analysis (though it may draw on many collateral sources). So we have imagery
analysts and COMINT analysts, radar analysts and telemetry analysts, among
others.
In order to be usable for intelligence purposes, as noted earlier, a signature
must be associated with a person, place, object, or process. That is a key function
performed during the exploitation phase. Often in intelligence, collectors want to
locate a specific person, object, or event in space and time, and the signature is
used for this purpose.
As discussed above, the processing phase of technical collection generally
produces signatures. Exploitation and analysis, either of a single source or of
several sources, generally identifies patterns that have intelligence significance.
This is a simplistic view, and there are exceptions to it, but it is a useful starting
point for discussing the process in the chapters that follow. It is worth while to
distinguish between signatures and patterns, since the two concepts often overlap
and the distinction can be subtle at times. To illustrate the difference between a
signature and a pattern, consider an intelligence example of recent significance:
the identification of Osama bin Laden’s hiding place.
Figure 6.2 shows a drawing of the compound formerly occupied by Osama
bin Laden in Abbottabad, Pakistan. This drawing, and the image from which it
5
was created, show a combination of signatures that are readily recognized. There
are high privacy fences, a few buildings, gates, and communications satellite
antennas, each of which has a distinct signature. But the layout of these features
creates a pattern that has intelligence significance. The unusually high walls,
many gates, and privacy measures indicate an excessive concern with security
and an attempt to confuse and delay would-be invaders.
It can be difficult to distinguish the difference between a pattern and a
signature, and there is a certain amount of overlap between the two in practice.
But the Abbottabad example illustrates how things usually work out. The
processing phase provided a number of signatures. An imagery analyst in the
exploitation phase, familiar with how residential compounds in that region
typically are laid out, could recognize the unusual pattern that the combined
signatures produced.
DISSEMINATION
LIBRARIES
time, particularly to support tactical operations. And the libraries have to provide
the signatures at the needed level of fidelity. This is a continuing challenge, and
it’s not getting easier as collection technology advances. Many existing signature
databases are out of date, since they contain data recorded by older, much lower
fidelity sensors.
Structure
Chapter 1 described the structure of intelligence collection at the national level.
The structural breakout shown in Figure 1.5 is a fairly common one among
national governments. The United Kingdom, France, Russia, and several other
countries all have a similar top-level division, usually placing technical
collection organizations within their military departments (as the United States
does).
But within any large collection organization focused on a specific INT,
subordinate structures are needed to support collection from a specific source or
class of sources. Within a national-level imagery intelligence (IMINT)
organization, for example, there typically will be subunits that collect and
process only visible optical imagery; or only spectral imagery; or only radar
imagery. The usual pattern is the stovepipe that was discussed in the Preface and
that is structured to follow the process shown in Figure 6.1.
So, the nature of the process shapes the structure. But the customers and the
sources shape it as well. Chapter 1 discussed the difference between mass
collection and boutique collection. The specific structural design used in
technical collection usually depends on whether the collection is mass or
boutique. A mass collection system that supports many customers has to be
automated as much as possible, especially when the intelligence produced is
time-critical. Boutique collection typically is aimed at specific targets; it usually
requires more up-front planning, and the processing and exploitation are usually
more time-consuming, labor-intensive, and expensive. The structure, again,
reflects that difference. It determines, for example, where to locate the
processing, exploitation, and dissemination systems. Where time is critical, these
assets may be located on board a ship, in an aircraft, or on the ground close to
the battlefield. Where special processing and exploitation expertise is required
and timeliness is not so critical, they are located centrally, often far from the
point of collection. Collection results that are to be widely disseminated also
tend to be processed centrally if timeliness is not a factor.
Prior to the Cold War, very little use was made of technical collection by
national-level customers. Military aircraft conducted photo and electronic
intelligence (ELINT) reconnaissance flights to support military operations in the
theater. That all changed in the United States when a need arose for detailed
knowledge of strategic targets located in the Soviet Union and the People’s
Republic of China. Coverage of these targets initially was provided by U-2s
operated by the Central Intelligence Agency (CIA), and the processing and
exploitation was handled centrally. That led to a central U.S. organization to
handle strategic imagery. Later, the need to support strategic planning and treaty
monitoring drove the centralization of other technical collection, processing, and
exploitation programs that are discussed in Part II. Strategic intelligence to
support a broad range of topics—weapons acquisition, treaty monitoring,
warning of disease outbreaks, and energy shortages—all these, and many more,
became important in the last half of the 20th century.
Concern for protecting sources and methods can shape structure and vice
versa. Clandestine technical intelligence operations tend to more closely
resemble sensitive HUMINT and COMINT. National-level customers typically
want to protect the competitive advantage that intelligence gives them, so
centralized processing and exploitation are combined with limited dissemination
of clandestine technical intelligence. In contrast, tactical military ELINT and
IMINT usually require little protection and must be disseminated quickly to a
large set of customers, so they rely on a decentralized structure. Law
enforcement in the United States already has a highly decentralized structure.
Because intelligence has to be shared among a number of agencies at the
national, state, and local levels, these agencies of necessity take a more flexible
approach to sources and methods.
Summary
Technical or nonliteral collection finds wide uses in intelligence. It is used,
among other things, to identify and track persons and vehicles, assess industrial
processes, monitor treaty compliance, target smart weapons, defeat camouflage,
and interpret weapons test results. Technical collection can be described as
having three generic functions, all interrelated, though it supports other functions
as well:
The major steps in the process are shown in Figure 6.1, which also
describes the way collection is structured: It is a linear process.
To repeat Michael Herman’s comment from the Introduction, technical
(nonliteral) intelligence is about “observations and measurements of things” that
have intelligence significance. The process to do that begins with planning
collection against specific targets of intelligence interest. A collection strategy,
discussed in Chapter 18, is needed. Then comes collection—applying the
available collection assets against the targets. Most nonliteral collection is done
by sensors operating in some part of the EM spectrum, but some valuable
intelligence is collected by non-EM sensors or by physical access. In fact, a wide
range of signatures are collected from materials, equipment, processes, and
humans but do not involve EM sensing. Technical collection, for example, is
used to obtain acoustic, nuclear, chemical, biological, and biometric signatures.
The processing and exploitation of collected material mostly involves
identifying a signature or pattern, tying it to a specific target, associating it with
other targets and events, and monitoring target movements. Most technical
collection, then, requires obtaining and analyzing nonliteral information in the
form of signatures. A signature is created by measuring the strength, intensity, or
state of some physical or chemical entity, over space, time, frequency, or all
three.
The analysis of signatures often results in the identification of a pattern that
has intelligence value. In order to be useful for intelligence, the signature also
has to be associated with a person, object, or process. This includes locating the
signature (and therefore the person, object, or process) in space and time. The
result of that process is disseminated as raw intelligence, to eventually be
incorporated into all-source intelligence.
An essential component of technical collection is the signature library that
associates signatures with a specific person, object, or process. Increasingly,
these signatures need to be accessed by military and law enforcement
operational units in real time.
The structure of technical collection units is shaped by the nature of the
sources and customers (mass collection, with many targets and many customers,
has to rely on automated systems for the back end; boutique collection with few
sources and a select customer set tends to have a more deliberate, time-intensive,
and expensive back end). A need to protect sources and methods forces a more
centralized and stovepiped structure.
NOTES
1. Mark M. Lowenthal, Intelligence: From Secrets to Policy, 4th ed. (Washington, DC: CQ Press, 2009), 69–73, 90–101.
2. J. J. Szymanski and P. G. Weber, “Multispectral Thermal Imager: Mission and Applications Overview,” IEEE Transactions on Geoscience and Remote Sensing, Vol. 43, No. 9 (September
2005), 1943–1949; Jeffrey L. Hylden, “Remote Sensing of Chemical Plumes (17),” Pacific Northwest National Laboratory, April 2001,
www.technet.pnl.gov/sensors/macro/projects/es4remchem.html.
3. John L. Morris, “The Nature and Applications of Measurement and Signature Intelligence,” American Intelligence Journal, Vol. 19, No. 3 & 4 (1999–2000), 81–84.
4. Don Atkins and George Crawford, “Reprogramming Brilliant Weapons: A New Role for MASINT,” American Intelligence Journal, Vol. 17, No. 3 & 4 (1997), 45–46.
5. U.S. Department of Defense public domain image, acquired 26 September 2012 at https://www.google.com/search?
q=U.S.+Department+of+Defense+drawing+of+bin+Laden’s+compound+in+Abbottabad,+Pakistan&hl=en&prmd=imvns&tb
m=isch&tbo=u&source=univ&sa=X&ei=MUBjUOfeM02E9QTr40HwCg&ved=0CC8QsAQ&biw=936&bih=800.
6. Zachary Lum, “The Measure of MASINT,” Journal of Electronic Defense (August 1998), 43.
7. Steven M. Bergman, “The Utility of Hyperspectral Data to Detect and Discriminate Actual and Decoy Target Vehicles,” Naval Postgraduate School, Monterey, CA (December 1996), xiii–
xv.
7. Collection Sensors
• Within that region of coverage, they have some level of resolution that
allows them to distinguish targets of interest.
1. Spatial
2. Spectral
3. Intensity
4. Temporal
Sensors divide into two general classes: active and passive. Our eyes and ears
are passive sensors; they receive only. Bats and dolphins have active sensors—
they rely on transmitting sound and receiving the reflected sound to locate
targets.
Active sensors such as radars and active sonars transmit a signal and then
interpret the signals that are reflected off the target. Passive sensors exploit
natural emissions or man-made signals or use an alternative illumination source,
such as the sun. Most passive sensors operate in the microwave or optical bands.
Each class and frequency band has unique advantages and disadvantages. And
each class encompasses several specific sensor types, each of which has
advantages and disadvantages.
Some sensors used in intelligence can operate at very long ranges, and their use
is called remote sensing. Others are designed to function in the immediate
vicinity of their targets, and their use is often referred to as close-in sensing. One
might think that our natural senses function only close-in, but we can hear the
sound of thunder from a lightning strike many miles away, and we can view
objects in the night sky that are many light-years away.
Remote sensing is important in intelligence because EM waves can be
collected at great distances, depending on such factors as the strength of the
signal, the noise entering the sensor, and the sensor’s sensitivity. When mounted
on satellites or aircraft, EM sensors can obtain information about the earth’s
surface or activity on or near the earth’s surface at very long ranges. A great deal
of this remote sensing is done for civil applications— environmental and
resource management studies, weather forecasting, and so forth. In intelligence,
remote sensing from air or space focuses on mapping the earth, characterizing
objects on it, and locating and tracking the movement of man-made objects. It
also includes the reverse—observing the movement of airborne or spaceborne
objects (aircraft, ballistic missiles, or satellites) from the earth’s surface.
But EM waves also can be sensed well at short distances. At short ranges,
EM sensors find many intelligence uses because they can sense very weak
signals, including unintentional emissions. The challenge often is to get the
sensor into close proximity without being discovered.
Most acoustic sensors, and all nuclear radiation sensors, function only at
very short ranges. But acoustic signals can be sensed at remote distances under
certain conditions. For example, some acoustic signals can travel through the
earth or water and be sensed at distances of hundreds or even thousands of
kilometers. These signals also can have intelligence value, and they are
discussed in Chapter 14.
SPATIAL SENSING
Coverage. All sensors are able to look at a defined volume of space. Radio
frequency sensors have a defined beamwidth. Optical sensors have a defined
field of view. Beamwidth or field of view is determined by the size of the
aperture and by the frequency of the transmitted or received signal. The antenna
in a cell phone has extremely broad beamwidth, because the tower signal can
come from any direction. But a dish antenna used to receive satellite TV has a
relatively narrow beamwidth and must be aimed exactly at the broadcast
satellite. Our eyes have a fairly wide field of view. A telescope has a much larger
aperture than our eyes, giving it a relatively narrow field of view.
It is especially desirable in imaging to obtain spatial coverage over a wide
area, and there are two ways to do this. The first approach is to image one small
area at a time, and so over time to build up a complete picture of a large region.
The second approach is to image the entire region nearly simultaneously. The
latter method is very difficult to do, but it has special value in intelligence, and
imagery analysts call it synoptic coverage.
Images where only large features are visible are said to have coarse or low
resolution. In fine or high-resolution images, small objects can be detected.
Intelligence sensors, for example, are designed to view as much detail as
possible and therefore have very fine spatial resolution. Commercial satellites
provide imagery with resolutions varying from less than 1 meter up to several
kilometers.
The accuracy with which a sensor can resolve a target’s location becomes
important when the target is to be attacked by precision weaponry. In general,
optical imagery provides the most accurate location of a target because the
location of known objects in the image can be used to estimate the location of a
target. The location of the imaging platform when the image is taken can be
important for obtaining spatial accuracy, and the global positioning system
(GPS) is used extensively to determine the exact location of sensor platforms.
The French SPOT imaging satellite, for example, has a spatial accuracy on the
order of 30 meters. Spatial accuracy is harder to achieve in signals intelligence
1
(SIGINT), where the term geolocation accuracy is used to describe the sensor’s
performance.
Spatial measurement accuracy is also important in identifying the visual
signatures of objects. A given missile, for example, has a unique set of
dimensions at some level of measurement accuracy. If a sensor can only measure
those dimensions to within 1 meter, then it is unlikely that the missile signature
can be uniquely identified. A sensor that can measure those dimensions to within
a millimeter is likely to come up with a unique signature that will distinguish it
from all other missiles of the same type.
SPECTRAL SENSING
Before going into the characteristics of spectral sensing, let’s briefly look at the
two major parts of the EM spectrum in which these sensors function— the RF
and optical spectrums.
The RF Spectrum. Figure 7.1 shows the part of the radio frequency spectrum
that is used for remote sensing in intelligence. The RF spectrum continues into
lower frequencies (off the left side of the figure), but intelligence collectors are
primarily concerned with the part of the spectrum shown here. Note that the
spectrum is divided into named bands; these will be discussed in later chapters.
The spectrum also continues upward in frequency (to the right), but the
continuation is the optical spectrum, discussed next.
Signatures are collected in the RF spectrum in two ways: by passive sensors
that collect RF energy emitted by the target and by active or passive sensors that
collect RF energy reflected from the target. Passive RF sensors collect a wide
range of natural and man-made emissions, including
• thermally generated emissions (which also are noise, but are used in
imaging).
The Optical Spectrum. Figure 7.2 is a continuation of the spectrum from Figure
7.1 to higher frequencies (shorter wavelengths). This part of the EM spectrum is
called the optical spectrum; the sensors used here are fundamentally different
from those used in the RF spectrum.
In the optical spectrum, it is customary to refer to a part of the spectrum by
wavelength (usually in micrometers, commonly called microns and abbreviated
µm) rather than by frequency; the frequency numbers are so large as to be
cumbersome and are described in terms that are difficult to comprehend, such as
terahertz and pentahertz.
The optical spectrum is represented in Figure 7.2 as being composed of
energy bands, each having its own name or designation. The band boundaries
shown in the figure are commonly used, but there is no accepted standard either
for the number of bands or for their boundaries. Astronomers, for example,
divide the infrared band into three very broad bands (near, mid, and far infrared)
extending from 0.7 to 350 microns. The definitions shown in Figure 7.2 are used
2
throughout this book, since they are most convenient for discussing intelligence
applications.
Typically, optical sensing for intelligence purposes makes use of energy in a
wavelength range from the ultraviolet to the infrared portions of the
electromagnetic spectrum. Most optical sensors function in some specific band
within this region from the ultraviolet through the long wavelength infrared
(LWIR). Note that the visible part of the spectrum, extending from about 0.4 µm
to about 0.75 µm where the eye and most sensors function, occupies only a small
fraction of the overall optical spectrum.
As Figure 7.2 indicates, the optical spectrum also is divided into two
regions based on the nature of the signature obtained. Within these two regions
are specific bands that have distinct signature characteristics.
FIGURE 7.2 The Optical Spectrum
Coverage. All sensors cover a defined part of the EM spectrum. RF sensors have
a defined bandwidth. Optical sensors have a defined spectral coverage. The
sensor has not been designed that can cover the entire electromagnetic spectrum.
Radio receivers are used in the RF band to detect radio waves; detectors are used
in the optical band. As one moves upward in the RF band, different receiver
types and antennas are needed. As one moves across the optical band, different
detector types are required. It’s all EM energy, but the energy behaves differently
and must be detected differently. Our eyes, for example, are limited to seeing in
the visible spectrum. A reindeer’s eyes can see in the ultraviolet spectrum,
something human eyes cannot do.
INTENSITY SENSING
Coverage. All sensors have a range of intensity that they can receive; the range
is defined by two thresholds. The lower threshold is a point below which
incoming EM energy is considered noise and above which it is considered a
signal. An incoming signal that is too weak falls below this threshold and cannot
be detected, like a weak radio station that is overwhelmed by static. The upper
threshold is the point where the signal is too strong, so that it saturates the
receiver or, at some level of intensity, burns it out. The operating range of
intensity for a sensor lies between these two extremes of detectability and
saturation and is called the sensor’s dynamic range. The idea of dynamic range
is familiar to anyone who has listened to a cheap audio system. If the volume
control is set too low, the very soft notes of music disappear; if the volume
control is set too high, the loud sounds become distorted. Our eyes have a
dynamic range as well. As the available light level decreases, we lose first the
ability to see colors; finally we lose the ability to see anything at all. At the
opposite extreme, vision can be overwhelmed by very intense light, and again
we lose the ability to see.
For intelligence collection, the lower detection threshold needs to be as low
as possible because signals are often very weak, for two reasons. First, the sensor
often must be located far from the signal source. Second, even when the sensor
can be located close to the source, the signals themselves are often very weak.
The limitation on lowering a sensor’s lower threshold is noise from external or
internal sources. As the threshold is lowered, more and more noise spikes or
interfering signals appear above the threshold and are mistaken for the desired
signal. These spikes are referred to as false alarms. As an example, an optical
sensor could in theory detect a single photon—the smallest possible quantity of
light—from a target of interest. But the sensor would also detect a large number
of photons from objects near the target, and noise within the sensor itself would
make it almost impossible to identify the one photon coming from the target.
Depending on the application, threshold can be lowered to allow more of
these false alarms, known also as false positives—noise that is mistaken for a
desired signal. Alternatively, if the threshold is raised, the risk increases of
getting more false negatives—desired signals that are discarded as noise. There
are several techniques for lowering the threshold (reducing the false negatives)
while not increasing the false positives. One is to use several sensors
simultaneously and compare the received signals. Another is to use one sensor
but to repeatedly collect the signal over time to eliminate false positives.
TEMPORAL SENSING
Most sensors collect signatures over a period of time, and intelligence is very
much concerned with the changes in those signatures over time. Changes in the
spatial measurement of an object often indicate target motion; changes in the
spectral or intensity measurements usually result from target activity, and
specific changes may constitute a signature that indicates a certain type of
activity. For example:
construction, changes in rock and soil composition, and excavations all can be
observed as changes in imagery over time. Digital processing of successive
images can subtract the features that have not changed between images, allowing
an imagery analyst to identify the features that have changed. Radar offers even
5
more sensitive means for observing small changes and is discussed in Chapter
12.
Temporal resolution also can refer to separating two closely spaced events
in a signature. Our eyes, for example, have an upper limit on temporal
resolution. A video display refreshes itself about 60 times per second (60 Hz).
Because our eyes can’t resolve separate images at that rate, the pictures flow
smoothly together. At around 15 Hz, our eyes can detect separate images, and we
perceive a jerky motion in the display.
A radar signature can change very rapidly as the radar changes operating
modes. An ELINT receiver that is monitoring the radar must be able to detect
these changes. An optical sensor that monitors for nuclear blast detection must
be able to identify the unique pattern of two light bursts in rapid succession that
characterizes a nuclear burst.
The measurement accuracy of a signal’s arrival time at a sensor is known as
temporal accuracy, which is important in obtaining spatial accuracy. For images
taken from an aircraft or satellite, the timing of the image is important because
the platform is moving constantly. Timing the imaging event to within a second
is adequate for many purposes. In contrast, for systems that receive radio
frequency signals (for example, for radar and ELINT), the timing must be far
more accurate and measured to a high level of precision. Timing the arrival of a
signal is critical in geolocating the source. A radar measures range by accurately
and precisely determining the time between transmitting a pulse and receiving an
echo from the target. As discussed in Chapter 13, geolocating an emitter depends
on accurately and precisely measuring the arrival time of the signal at different
points. The GPS, in addition to geolocating a platform, provides a timing
reference that intelligence sensors can use to precisely determine the time when
an image is taken or a signal arrives.
When we began to use telescopes some 400 years ago, we quickly discovered a
limitation of that sensor: it gives substantially better resolution on objects, but
your field of view shrinks accordingly. The better the resolution, the worse the
spatial coverage. We’ve had to deal with that trade-off in sensors ever since.
Intelligence collectors want to obtain the greatest possible coverage—
spectral, spatial, radiometric/intensity, and temporal—with the highest possible
resolution from their sensors:
So, global synoptic coverage with high resolution is desired in all four
performance categories. The trend is for improvements to occur in all these
categories as technology advances. However, at any given level of technology,
improvements in one category usually come at a cost in some other category.
Consequently, all sensor designs are compromises.
The main choice, though, is usually between resolution (spatial, spectral,
intensity, or temporal) and coverage. Imaging sensors can cover a large area of
the earth quickly. They can do this because they can have a very wide swath
width, allowing the sensor to search a wide area in one pass. But in doing so,
they must choose between swath width and spatial resolution. Generally
speaking, the finer the resolution, the less total ground area can be seen. Good
resolution is essential for detecting observables on the surface. However, sensors
that have wide swath widths generally have poor spatial resolution, and sensors
with good resolution usually have small swath widths. As an example, a NOAA-
18 weather satellite sensor covers a large swath of the earth (more than 1,500 km
across), but its best resolution is on the order of 15 km—sufficient for obtaining
global temperature maps but not useful for most intelligence purposes. In
comparison, current imaging satellites, such as France’s SPOT and Israel’s Ofeq
satellites, have swath widths measured in a few kilometers but with spatial
resolution on the order of 1 meter.
6
RESOLUTION TRADE-OFFS
Trade-offs also have to be made among the four types of resolution— spatial,
spectral, intensity, and temporal—in the design of a sensor. Improving one type
of resolution always costs resolution in one of the other three types. For
example, to achieve high spatial resolution, an optical sensor has to have a small
pixel size, discussed in Chapter 9. However, this reduces the total amount of
energy that a pixel receives. The result is reduced radiometric (intensity)
resolution—the ability to detect fine energy differences. To increase the amount
of energy detected (and thus, the radiometric resolution) without reducing spatial
resolution, the wavelength range would have to be expanded. But this would
reduce the spectral resolution of the sensor.
Sensor Suites
There are two basic ways to overcome the constraints discussed above. Both
involve using multiple sensors.
One can deploy a number of platforms (satellites, ships, aircraft, or ground
sites, all of which are discussed in Chapter 8), each carrying a sensor, to provide
better spatial, spectral, radiometric, or temporal coverage. For example, Chapter
8 describes how a number of satellites can be placed in orbit to provide global
coverage; the required number increases at lower satellite altitudes.
One can also put multiple sensors on a single platform, each sensor
optimized for a specific purpose so that they complement each other. One sensor
might provide high spatial resolution, another might provide excellent spectral
resolution, and a third might provide a broad area of coverage. The continuing
advances in sensor technology have provided smaller and lighter sensor
packages that make it easier to put multiple sensors on a single airborne or
spaceborne platform. Because of the tendency to stovepipe collection, most
countries tend to put only one type of sensor (such as SIGINT or IMINT) on a
satellite platform. This has some advantages—systems engineering is simpler.
The orbit can be optimized for the sensor; typically, SIGINT and IMINT sensors
have different preferred orbits.
Where it can be done, though, the advantages of a platform that can collect
two or more types of intelligence, such as IMINT and SIGINT, are apparent. One
can get simultaneous collection of both types of intelligence from a target at the
same time, and a lot more can be learned about what is happening at the target.
An example of a multisensor platform discussed in Chapter 8 is the Global
Hawk unmanned aerial vehicle. It carries both an imaging radar and an optical
imager that complement each other very well: the imaging radar can function in
spite of clouds or fog and has good spatial coverage; the optical imager can
obtain images having high spatial resolution. India also has taken the approach
of putting multiple sensors on one platform. Their Communication-Centric
Satellite is an example. It is being designed as an intelligence collection satellite
with both SAR imagery collection and COMINT collection capabilities. The
satellite is scheduled to launch in 2014.7
Signatures
All of the sensors in this chapter collect measurements that after processing
result in specific signatures. The signatures then are exploited and analyzed to
produce raw intelligence about the sensors’ targets. The bulk of sensors used in
intelligence operate in some part of the electromagnetic spectrum. A few sensors
do not. Two examples, touched on in this chapter and described in later chapters,
are sensors that produce acoustic and radiological signatures.
EM SIGNATURES
The utility of remote EM sensing derives from the fact that when EM
energy is reflected and/or emitted from solid, liquid, or gaseous materials, it is
modified by those materials. This modified energy constitutes a signature that is
unique to the material. Emitted and reflected radiant energy can thus be used to
obtain a signature that is unique to a particular material or object.
Many signatures of intelligence importance in the optical band are spectral
signatures. The interaction of EM energy with matter can cause the emission of
energy in specific parts of the spectrum shown in Figure 7.2; this resulting
signature will be unique to the matter that emits the energy. Spectral signatures
therefore can be used to identify individual materials, alone or in mixtures.
A key component of an EM signature is the polarization of the
electromagnetic wave. All electromagnetic waves, RF or optical, are polarized,
meaning that the electric field vibrates in some direction. Polarization is an
important concept in intelligence because it can be used to obtain unique
signatures in both radar and optical imaging as well as in ELINT. The concept is
introduced and explained here, and it will be revisited frequently throughout the
remainder of Part II.
Radio frequency signals that are deliberately transmitted have a definite
polarization and can be defined as one of three types. The wave can be linearly
polarized, meaning that the electric field vibrates back and forth in a straight
line. It can be circularly polarized, so that to an observer the incoming electric
field seems to spin like the second hand of a clock (but far faster). Or it can be
elliptically polarized, so that the electric field spins, but the electric field vector
is stronger in one direction.
In addition to these three polarization types, the polarization has many
possible orientations. A linearly polarized wave may vibrate up and down
(vertically polarized), side to side (horizontally polarized), or at some angle in
between. The type of polarization and the orientation can be used to tell
something about the emitter.
Naturally emitted EM waves have a different type of polarization than
deliberately transmitted waves. They are likely to be randomly polarized,
meaning that the polarization changes constantly in random fashion. The best-
known example is sunlight. The exception is sunlight that bounces off a flat
surface— water, for example. The reflected light is horizontally polarized (and
we perceive it as glare). Sunglasses can be designed to pass only vertically
polarized light, filtering out the horizontally polarized glare. They do this
because they have many fine vertical lines that pass vertically polarized light and
eliminate horizontally polarized light. To determine the effectiveness of your
sunglasses, hold them slightly in front of you and look at a bright reflective
surface through the lenses; then, keeping your eyes on the surface through the
lens, rotate the lens 90 degrees. The reflective surface should become brighter, as
the lens passes rather than filters the horizontally polarized reflected light.
Polarimetry is the measurement of the polarization of EM energy, and a
polarimeter is used to make these measurements. Optical polarimetry is often
called ellipsometry. It is extensively used in astronomy to characterize distant
stars and galaxies. In intelligence, this measurement when used with radar is
called radar polarimetry, discussed later.
ACOUSTIC SIGNATURES
Acoustic signatures are collected in the spectrum that includes audible sound
(above 20 Hz) and infrasound (below 20 Hz and usually not detectable by the
human ear). These signatures are covered in detail in Chapter 14.
RADIOLOGICAL SIGNATURES
Summary
Most nonliteral intelligence collection is done by sensors. The bulk of such
collection is done by EM sensors, but acoustic and nuclear radiation sensors also
are widely used. COMINT collection also makes use of both EM and acoustic
sensors.
Sensors can be active or passive. Active sensors (radars) transmit a signal
and then interpret the signals that are reflected off the target. Passive sensors
exploit natural emissions, man-made signals, or energy reflected from the target,
usually reflected solar illumination. EM sensors can be either active or passive.
Acoustic and nuclear radiation sensors are almost all passive.
Some sensors used in intelligence can operate at very long ranges, and their
use is called remote sensing. Others are designed to function in the immediate
vicinity of their targets, and their use is often referred to as close-in sensing.
All sensors can collect signatures that are used to identify or classify targets
of intelligence interest. Some objects radiate energy either naturally or as the
result of human actions, and that creates a signature. All objects reflect, absorb,
or scatter energy that hits them, and the nature of this interaction also creates a
signature. Most such energy, again, comes from some part of the EM spectrum.
It divides broadly into two regions—the radio frequency spectrum and the
optical spectrum. The sensors used, and the phenomena sensed, differ
significantly in these two regions.
All of the sensors used to collect intelligence have these things in common:
They have a definite region of coverage, and within that region of coverage, they
have some level of resolution that allows them to distinguish targets of interest.
The performance of any sensor, and its value in intelligence, are determined by
its coverage and resolution in four performance categories: spatial, spectral,
intensity, and temporal.
NOTES
1. Satellite Imaging Corporation, “Spot-5 Satellite Sensor,” accessed 22 September 2012 at http://www.satimagingcorp.com/satellite-sensors/spot-5.html.
2. NASA definition of near, mid, and far infrared bands (2009), accessed 22 September 2012 at http://www.ipac.caltech.edu/Outreach/Edu/Regions/irregions.html.
3. Doppler effect, or Doppler shift, refers to a change in the observed frequency of an acoustic or electromagnetic signal emitted by or reflected from a moving object, when the object and
the observer are in motion relative to each other.
4. Joe Lees and Robert Mott, “Change Detection for More Actionable Intelligence,” Spectroscopy (January 1, 2006), accessed 22 September 2012 at
http://www.spectroscopyonline.com/spectroscopy/article/articleDetail.jsp?id=285288.
5. Ibid.
6. Satellite Imaging Corporation, “Spot-5 Satellite Sensor,” Barbara Opall-Rome, “Israel Declares Ofeq-9 Reconnaissance Satellite Operational,” Space News (June 22, 2010), accessed 22
September 2012 at http://spacenews.com/launch/100622-israel-launches-spy-satellite.html.
7. Kerur Bhargavi, “India’s Spy in the Sky by 2014,” DNA India (February 10, 2010).
8. European Space Agency, “ERS Overview” (updated August 17, 2011), accessed 22 September 2012 at www.esa.int/esaEO/SEMGWH2VQUD_index_0_m.html.
8. Collection Platforms
This chapter focuses primarily on the use of collection platforms for remote
sensing, since most technical collection is done that way.
As we discussed in Chapter 7, remote sensing has a long history. Sensing
space objects from earth, for example, dates back to antiquity, even before
Galileo invented the telescope. The reverse, sensing the earth’s surface, has been
of intelligence interest for centuries. The French were the first to use manned
balloons for aerial reconnaissance in 1794, during their conflict with Austria.
This reconnaissance contributed to the French victory by providing a way for the
French to observe the makeup and activities of their enemies. The French
experiment involved two themes that recur in all collection platforms:
• Getting the intelligence from the collection platform to those who need
it. For the French, this involved a balloonist either sending flag signals or putting
a written message in a sandbag fitted with rings and sliding it down the tether
cable.
• Protecting the platform from hostile action. The French used two widely
separated tether cables to reduce the chance that the enemy would end the
reconnaissance by cutting the cable so that the balloon drifted away.
Satellites
Satellites provide the bulk of the remote sensing used today in intelligence. A
satellite can be used for observing the earth’s surface or for observing other
satellites. Satellites have unique characteristics that make them particularly
useful for intelligence collection. One of the major advantages is that a
reconnaissance satellite can legally overfly any country while obtaining
intelligence information. An aircraft or unmanned aerial vehicle (UAV) cannot.
Another advantage is that satellites are used for many purposes that have nothing
to do with intelligence. Satellites do earth resources sensing and provide
communications for commercial, military, and nonmilitary governmental
purposes. Therefore, it can be difficult for opponents to identify those satellites
that are collecting intelligence.
Many countries have launched reconnaissance satellites since the first
launches in 1960; Russia, China, the United States, France, Germany, Japan,
India, and Israel all have reconnaissance satellites in orbit. The total number of
launches over the years probably is in the hundreds. Satellites have a lifetime of
only a few years, and there have been a number of launch failures, especially in
the early years.
Satellites used for intelligence purposes customarily are referred to in the
United States as overhead collection assets. The term additionally could be
applied to aircraft, which also collect imagery and signals intelligence (SIGINT)
from overhead (and some writers do include aircraft in the definition). But over
the years the term overhead collection has acquired an understood meaning:
collection from satellites. Another term for satellite collection that will be
1
revisited in this book is the euphemism national technical means (NTM), which
is still used occasionally. The term had its origin in the Limited Test Ban Treaty
of 1963, where the signatories used it in agreeing that they would not interfere
with each other’s satellite collection capability. At the time, both sides wanted to
protect that capability but did not want to admit publicly that they were spying
from satellites.
The two most important things to understand about satellites are (1) how
different orbits function, and their relative advantages in intelligence collection;
and (2) the constraints imposed by the space environment.
ORBITS
Figure 8.2 illustrates a side view comparison of these four orbit types,
drawn to scale. Note that the MEO orbits are shown as two distinct orbit
altitudes. The reason for this separation is explained in the discussion on the
space environment, later in this chapter.
• A GEO satellite, for example, must move at the same speed as the
earth’s rotation in order to maintain its fixed position over the earth. Therefore, it
has approximately a zero degree inclination, so that it travels over the equator
eastward (in the direction of the earth’s rotation).
• Satellites in a polar orbit have a 90-degree inclination; they cross the
equator moving directly north or south and cross over the poles. Figure 8.3
shows a satellite in a polar orbit.
2
rotation of the earth work together to allow complete coverage of the earth’s
surface after the satellite has finished one complete cycle of orbits.
Starting with any randomly selected pass in a satellite’s orbit, an orbit cycle
is completed when the satellite retraces its path, passing over the same point on
the earth’s surface directly below the satellite (called the nadir point) for a
second time. The exact length of time of the orbital cycle varies with the
satellite’s altitude and inclination. In Figure 8.5, 14 orbits occur before the
satellite begins to repeat its orbit cycle.
FIGURE 8.3 Geometry of a Polar Orbit
The interval of time required for the satellite to complete its orbit cycle is
not the same as the revisit period. Using steerable sensors, a satellite-borne
instrument can view an area away from its nadir before and after the orbit passes
over a target, thus making the revisit time less than the orbit cycle time. The
revisit period is an important consideration for a number of monitoring
applications, especially when frequent imaging is required (for example, to
monitor a rapidly developing crisis situation). In near-polar orbits, areas at high
latitudes will be imaged more frequently than the equatorial zone due to the
increasing overlap in adjacent swaths as the orbit paths come closer together
near the poles, as illustrated in Figure 8.5. For this reason, reconnaissance
4
The discussion to this point has been about coverage of the earth by a single
satellite. And, as noted, a single LEO satellite can cover the entire earth about
twice per day. To get more frequent coverage, more satellites have to be
deployed. In intelligence, it is highly desirable to have synoptic coverage, that is,
to leave no important target area unmonitored. But doing this takes a lot of
satellites. Figure 8.6 illustrates the coverage problem for a hypothetical
constellation of satellites in a circular orbit at 4,000 km altitude, 90 degrees
inclination (that is, a polar orbit), where the coverage is defined such that the
minimum angle of elevation from the target to the satellite (known as the
grazing angle) is 20 degrees. Note that it takes more than 12 satellites to obtain
6
Satellites have the advantage of being able to collect imagery more quickly over
a larger area than airborne systems and to provide a predictable viewing
geometry. The coverage may not be as frequent as that of an airborne platform,
but—depending on the orbit, the viewing geometry, and the geographic area of
interest—a single LEO satellite typically has a revisit period of less than two
hours.
One specific orbit—the sun-synchronous orbit—is widely used for
intelligence collection of optical imagery. A sun-synchronous orbit is so named
because the satellite’s orbit moves westward with the sun’s apparent movement.
As a result, the satellite passes over a given point on the earth at approximately
the same time every day.
Satellites have several advantages for conducting SIGINT. They can cover a
large area of the earth in a very short time. While LEO satellites cannot dwell on
a target area, their movement across the earth allows them to quickly geolocate
the source of a signal. GEO satellites can dwell on a target area indefinitely, and
HEO satellites can have a relatively long dwell (on the order of 10 hours) near
apogee. The disadvantage of both GEO and HEO satellites is that, being
relatively far from their targets, they require large antennas and even then cannot
readily pick up weak signals.
Figure 8.7 illustrates the four orbit types discussed earlier. Note that the two
MEO orbits are designed to avoid both radiation belts (as is the LEO orbital
regime). HEO orbits, however, move through both radiation belts, so satellites in
these orbits need additional shielding from radiation effects.
FIGURE 8.7 Van Allen Radiation Belts
While the earth’s shadow isn’t a hazard like those discussed above, it does
cause problems for some spacecraft. A typical LEO satellite spends close to one-
third of its time in darkness. Since most satellites rely primarily on solar cells for
power, this means that the LEO craft has only about twothirds of the power that
is available to a HEO or GEO satellite.
for all but the most severe variations in motion, such as significant air
turbulence.13
Aerostats
Satellites, aircraft, and UAVs all have one major disadvantage: Single platforms
are unable to perform continuous surveillance of a target area over a period of
days. (The one exception is the geostationary satellite.) The aerostat, a lighter-
than-air vehicle that can remain stationary in the air (including blimps,
dirigibles, and tethered balloons), can do that. Most aerostats are tethered, but
free-flying aerostats (usually called airships) are able to either maintain position
for extended periods or move around as the mission requirements dictate. The
U.S. military has used tethered aerostats for surveillance in Iraq.
15
The standard tactic for the smugglers is to fly below ground radar coverage;
ground-based radars have very short ranges (about 10 kilometers) against low-
flying aircraft. An aerostat-borne radar can extend this detection range to
hundreds of kilometers.
The United States is developing a high-altitude unmanned airship for
surveillance and intelligence use. This new airship would reportedly be capable
of operating at 65,000 feet altitude and staying aloft for 10 years. Using its
onboard radar or other sensors at that altitude, the airship would be able to
monitor targets of intelligence interest over a region the size of Iraq. At 65,000
17
feet altitude, the airship would be above the jet stream and therefore more
capable of remaining in one area for an extended time. 18
The ship has an unusual hull shape, with a number of characteristics that
make it an excellent intelligence collector. Its narrow front and wide beam make
it a very stable surveillance platform even in the rough weather of the Arctic. It
also has a large internal bay devoted to computing and analyzing the collected
data; and an onboard capability to do technical analysis of collected signals.20
Ground Sites
Ground sites are used for remote sensing of aircraft, ballistic missiles, and
satellites. Radar and optical sensors can be used both for locating these objects
spatially and for collecting signature measurements for object identification.
Some ground-based platforms used in intelligence are mobile or portable, but
some very important ones are large fixed sites that therefore have the
disadvantage of having a fixed coverage area. Offsetting this disadvantage, fixed
sites are very stable platforms with precisely known locations (in order to
precisely locate something, you have to know precisely where you are). Ground
sites are used for air and space surveillance, surface surveillance, and close-in
clandestine collection, all discussed below. They also find intelligence use in
acoustic and seismic sensing, discussed in Chapter 14.
An important intelligence use of ground sites is for air and space situational
awareness. Air surveillance is routinely done by thousands of radars worldwide,
only a few of which are collecting intelligence. Space surveillance is done at
only a few sites, and they include some important intelligence collectors. Two
examples of such sites are the Cobra Dane radar, discussed in Chapter 11, and
the Maui Space Surveillance System, discussed below.
Figure 8.10 shows the Maui Space Surveillance System, an optical site that
combines operational satellite tracking facilities with a research and
development facility. It is located at the 10,000-foot summit of Haleakala
Mountain on the island of Maui, Hawaii. The mountaintop location is well suited
for both astronomical telescopes and optical facilities used for space
surveillance. The high elevation means that the site is usually above cloud cover,
and it also reduces the distortion in viewing caused by the atmosphere.
The telescopes at Maui track man-made objects to GEO altitudes and
beyond, and they collect optical signatures to use for space object identification.
The site has several telescopes that accommodate a wide variety of sensor
systems, including imaging systems, photometers, infrared radiometers, and low-
light-level video systems, all of which are discussed in subsequent chapters.25
FIGURE 8.10 Maui Space Surveillance System
SURFACE SURVEILLANCE
Surface surveillance radars have been used by military forces since World War II
for battle space awareness. They are used to detect and recognize moving targets
such as people, vehicles, watercraft, and low-flying rotary wing aircraft. Such
radars have been used for intelligence collection in urban warfare; border,
airport, and nuclear facility security; observing terrorist and narcotrafficker
movements; and monitoring activity of opposing forces on the battlefield. 26
Radars and SIGINT systems that scan the skies, such as space surveillance
radars and most air defense radars, have no special requirement to be situated
high above the ground. But radars and SIGINT systems that must scan the
earth’s surface or detect low-flying aircraft need as much altitude as possible. As
with the SIGINT ship in Figure 8.9 and the aerostat radars previously discussed,
increased height equals increased detection range. Aerostats often are
impractical for use in battlefield areas, as they are easy targets for opposing
counter-air systems. The solution has been to develop battlefield surveillance
systems that can raise their antennas when operating. The BUR radar built by the
European firm EADS and shown in Figure 8.11 illustrates the use of this design
approach in a radar designed to detect low-flying aircraft and helicopters.
27
Modern electronics technology allows us to fit almost any of the passive sensors
discussed in this book into a small package that can be clandestinely emplaced
near a target of interest. Electromagnetic and acoustic sensors are now
sufficiently small and rugged that they can be deployed in large numbers and
operate for extended periods without maintenance. Such devices can be
disguised as innocuous objects or concealed and located near hostile borders or
in controlled spaces within countries.
One of the earliest such devices that has been openly acknowledged is the
Igloo White sensor that was deployed along the Ho Chi Minh trail during the
Vietnam War. Approximately 20,000 of these sensors were dropped from
aircraft, and some were deployed by special operations ground forces. The
sensors monitored acoustic and seismic signals from the North Vietnamese
trucks and troops on the trail and tracked their movements.28
Summary
Technical intelligence relies on an extensive array of sophisticated instruments
that collect information from a variety of platforms—satellites, aircraft and
UAVs, aerostats, ships, submarines, and ground stations. Collection platforms
must be protected so that they can survive in a hostile environment. Where
possible, it is also desirable to make them clandestine, to allow them to collect
intelligence without the opponent being aware of the collection.
Remote sensing platforms can be used in intelligence for surveillance or
reconnaissance. The difference between the two is the dwell time on the target
area; surveillance is defined as continuous dwell, while reconnaissance is a dwell
for a relatively short period of time, even a snapshot.
FIGURE 8.12 Steel Eagle Acoustic Sensor 30
NOTES
1. Albert D. Wheelon, “Technology and Intelligence,” Technology in Society, Vol. 26 (April–August 2004), 245–255.
2. Figure accessed 22 September 2012 from www.centennialofflight.gov/essay/Dictionary/SUN_SYNCH_ORBIT/DI155.htm.
3. Figure accessed 22 September 2012 from www.newmediastudio.org/DataDiscovery/Hurr_ED_Center/Satellites_and_Sensors/Polar_Orbits/Polar_Orbits.html.
4. Ibid.
5. Barbara Opall-Rome, “Israel Declares Ofeq-9 Reconnaissance Satellite Operational,” Space News, (June 22, 2010), accessed 22 September 2012 at http://spacenews.com/launch/100622-
israel-launches-spy-satellite.html.
6. Figure derived from U.S. Patent 5931417, “Non-geostationary orbit satellite constellation for continuous coverage of northern latitudes above 25° and its extension to global coverage
tailored to the distribution of populated land masses on earth” (August 3, 1999).
7. Canada Centre for Remote Sensing, “Tutorial: Fundamentals of Remote Sensing Image Interpretation & Analysis,” accessed 22 September 2012 at
www.ccrs.nrcan.gc.ca/resource/tutor/fundam/chapter4/02_e.php.
8. Sharma Jayant, Grant H. Stokes, Curt von Braun, George Zollinger, and Andrew J. Wiseman, “Toward Operational Space-Based Space Surveillance,” Lincoln Laboratory Journal, Vol.
13, No. 2 (2002), 328.
9. Andrea Shalal-Esa, “U.S. Air Force Begins Using Boeing Surveillance Satellite,” Reuters (August 20, 2012), accessed 13 October 2012 at http://news.yahoo.com/u-air-force-begins-using-
boeing-surveillance-satellite-003010197-sector.html.
10. Paul Marks, “Satellite Collision ‘More Powerful than China’s ASAT Test,’” New Scientist (February 13, 2009), accessed 22 September 2012 at www.newscientist.com/article/dn16604-
satellite-collision-more-powerful-than-chinas-asat-test.html.
11. Eric Lai, “In Satellite Photo Resolution Race, Who’s Winning?” Computerworld (October 24, 2008), accessed 22 September 2012 at www.computerworld.com/action/article.do?
command=viewArticleBasic&articleId=9118079&intsrc=hm_list.
12. Zheng Liwen, Lv Xiaolei, and Xing Mengdao, “Imaging Method of UAV High Squint SAR,” Heifei Leida Kexue Yu Jishu (December 1, 2007), 431.
13. Canada Centre for Remote Sensing, “Tutorial: Fundamentals of Microwave Remote Sensing” (January 29, 2008), accessed 22 September 2012 at
www.ccrs.nrcan.gc.ca/resource/tutor/fundam/chapter3/09_e.php.
14. “The Fly’s a Spy,” The Economist (November 1, 2007), accessed 22 September 2012 at www.economist.com/displaystory.cfm?story_id=10059596.
15. Julian E. Barnes, “Spy Blimp: Air Force Planning Giant Airship,” Chicago Tribune (March 13, 2009).
16. U.S. Air Force, “Tethered Aerostat Radar System,” U.S. Air Force Fact Sheet (August 2007), accessed 22 September 2012 at www.af.mil/information/factsheets/factsheet.asp?id=3507.
17. Barnes, “Spy Blimp.”
18. “U.S. Army’s $150m ‘Super-blimp’ High-Altitude Airship in Crash Landing Just Hours after Launch,” MailOnline (July 28, 2011), accessed 22 September 2012 at
http://www.dailymail.co.uk/news/article-2019454/US-Armys-150m-superblimp-high-altitude-airship-crash-landing-hours-launch.html9.
19. Military-today.com, “Marjata Intelligence Collection Ship,” accessed 26 September 2012 at http://www.military-today.com/navy/marjata.htm.
20. Ibid.
21. Ibid.
22. U.S. General Accounting Office, Report #GAO/NSIAD-93-213 (September 10, 1993), accessed 22 September 2012 at http://www.dtic.mil/cgi-bin/GetTRDoc?
AD=ADA271225&Location=U2&doc=GetTRDoc.pdf.
23. Photograph by Peter John Acklam (July 4, 2011), used with permission, accessed 3 October 2012 at http://en.wikipedia.org/wiki/File:FS_Marjata_in_Kirkenes.JPG.
24. “The Falklands Radio Line,” Strategy Page (December 4, 2007), accessed 22 September 2012 at http://www.strategypage.com/htmw/htsub/articles/20071204.aspx.
25. “Air Force Maui Optical & Supercomputing Site,” U.S. Air Force, www.maui.afmc.af.mil/. Photo from NASA, Johnson Space Center, Orbital Debris Program Office (Photo gallery),
accessed 22 September 2012 at www.orbitaldebris.jsc.nasa.gov/photogallery/photogallery.html.
26. Lav Varshney, “Ground Surveillance Radars and Military Intelligence,” Syracuse Research Corporation (December 30, 2002), accessed 26 September 2012 at
http://www.mit.edu/~lrv/cornell/publications/Ground%20Surveillance%20Radars%20and%20Military%20Intelligence.pdf.
27. “Germany Orders New AESA Battlefield Radars,” Defense Industry Daily (May 19, 2009), accessed 26 September 2012 at http://www.defenseindustrydaily.com/germany-orders-new-
aesa-battlefield-radars-02452/.
28. John T. Correll, “Igloo White,” Air Force Magazine, Vol. 87, No. 11 (November 2004), accessed 22 September 2012 at http://www.airforce-
magazine.com/MagazineArchive/Pages/2004/November%202004/1104igloo.aspx.
29. Kevin T. Malone, Loren Riblett, and Thomas Essenmacher, “Acoustic/Seismic Identifications, Imaging, and Communications in Steel Rattler,” Sandia National Laboratories, published
in SPIE, Vol. 3081, 158–165, accessed 19 July 2012 at http://lib.semi.ac.cn:8080/tsh/dzzy/wsqk/SPIE/v013081/3081-158.pdf.
30. U.S. DoD public domain image from “Steel Eagle/Argus Program Overview” (November 21, 2002), accessed 26 September 2012 at http://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0CD0QFjAE&url=http%3A%2F%2Fwww.acq.osd.mil%2Fdpap%2Fabout%2FPEOSYSCOM2002%2Fpresentations%2FTechTransferPanel-
ARGUS-WinstonCampbell-Snyder.ppt&ei=TcxkULqaKYL08gTKmICAAw&usg=AFQjCNH6NuStXAKz0f58iIYKufgNx616Ig.
9. Optical Imaging
Function
EARTH IMAGING
Electro-optical imagers are useful in intelligence because they can cover large
areas of the earth’s surface, with spatial resolutions sufficient for obtaining
useful signatures and performing imagery interpretation. They provide a target
signature in the form of a target’s location plus identifying features (that is,
features that allow the identification of a type of terrain, building, aircraft, or
ship). A particular pattern of building and equipment layouts might identify a
complex, for example, as a weapons test range or a nuclear fuel reprocessing
plant. Recall that the pattern is not a signature. As discussed in Chapter 6, the
pattern identification is the result of analysis of a combination of signatures
(building and equipment layouts).
Continuous imaging (that is, surveillance) also can provide information
about target movements. Ground-based and airborne video cameras are
increasingly being used by both law enforcement and military units for
conducting surveillance of developing situations on the ground or at sea.
Unmanned aerial vehicles (UAVs) and aerostats provide excellent platforms for
these steerable video cameras. For intelligence purposes, such airborne
surveillance allows analysts to establish connections between known and
unknown targets, determine the time history of those connections, and identify
new targets. Airborne video is effective in tracking terrorist or insurgent
movements, dealing with weapons proliferation, and monitoring activity at
borders and ports.1
SPACE SURVEILLANCE
The preceding section discussed the use of optical sensors in creating images of
the earth’s surface or of objects of interest. A second major function of optical
sensors is supporting space situational awareness. In combination with the radar
sensors discussed in Chapter 11, optical sensors provide details about the
location and movement of objects in orbit around the earth and details that help
to identify the objects. With the increasing trend toward both military and
civilian uses of space, it has become important for all countries to be aware of
what is in orbit and the potential threats to their national interests from other
countries’ space systems. To do that, optical sensing is used to help identify
objects in space, understand their missions, and, ultimately, determine if they
have hostile intent.
Space situational awareness is also important to both military and civilian
users of space because of the large number of objects—both operational
satellites and space junk—in orbit. Because of the increasing potential for
collisions (which create more space junk), major spacefaring nations maintain
catalogs of space object orbital parameters for collision warning. In the United
States, the space surveillance network uses both optical and radar sensors to
maintain a space catalog and to support collision avoidance.
The main advantage of optical systems is their relative cost effectiveness in
searching for and tracking satellites that are in highly elliptical (HEO) and
geostationary (GEO) orbits. While it is possible to use radar to track satellites at
GEO altitudes, such radars are extremely expensive because of the necessary
specialized high-power equipment and their high power consumption. Optical
tracking systems, on the other hand, cost less per unit than radars. Their low cost
and ease of use make optical systems attractive to third world countries wishing
to develop a space surveillance capability.
Optical systems also are valuable for concealing the fact of intelligence
collection. Whereas an opponent’s satellite can detect that it is being tracked by
radar, it cannot detect that it is being tracked by a passive optical system. Since
the sun usually is being used as an illuminator, the optical site does not give
away its location or mission in performing its observations.
Process
The preceding section described the importance of optical imaging of the earth
from airborne and spaceborne platforms and of optical surveillance of satellites
from the earth. There are significant differences in the processes used for each,
as discussed in this section.
PLANNING
Collection planning is done quite differently for airborne imaging than for
spaceborne imaging. Aircraft and UAV flights are planned on an individual basis
to meet specific needs (usually military or law enforcement operations). Flight
routes are planned in advance, but they can be altered in flight to collect against
high interest targets that suddenly become available.
Which of these platforms (manned aircraft, UAV, aerostat, or satellite) is
used for collection depends on the location and nature of the target and on the
type of imagery required. Imaging of denied areas must typically be done by
satellites, which have global access. If the collection organization has control of
the airspace, then aircraft, UAVs, and aerostats may be used and have the
advantage of being able to loiter over an area to conduct surveillance—
something that imaging satellites cannot do. Aerostats are particularly useful for
their long-duration loitering capability, where video surveillance is usually
preferable to still images.
For imaging satellites, the orbit is set and only small changes are possible.
Imaging satellites operate in low earth (LEO) orbits to get the best possible
resolution, which means that the satellite cannot dwell for long on a target of
interest. Within the field of regard, the satellite can image any location. But the
best quality imagery comes from directly beneath the satellite (nadir), and image
quality steadily worsens further from nadir. So it is desirable to plan images as
close to nadir as possible.
Typically, the satellite is tasked in advance, and changes to the target set are
not made on an ad hoc basis except in crisis situations. Optical imaging of the
earth usually is planned against three general target classes: specific targets in
specific locations (known as point targets); a specific geographic region (called a
directed search area); or a river, road, or railroad (referred to as a line of
communication). Targets have to be ranked according to some priority system.
The required image quality has to be taken into account, along with any special
constraints such as collection geometry.
Optical sensing of satellites from earth has both similarities and differences
from optical imaging of earth from space. In both cases, cloud conditions
determine whether intelligence collection can be done. Collection in both cases
also has to be timed to take advantage of target visibility and lighting conditions.
When imaging the earth’s surface, we usually want to choose a time when
shadows are present to aid in interpreting imagery. When looking at satellites,
we ideally would like to have the ground site in darkness while the sun
illuminates the satellite (a situation called the terminator condition). The major
difference is that imaging of earth from space is done by reconnaissance; the
imaging satellite cannot dwell on a target for long. Satellites, though, can be
observed continuously when clouds and lighting conditions permit. So planning
is designed to allocate resources among three missions: maintaining the space
catalog of satellites, searching for new satellites, and monitoring new satellites
that are discovered, in order to determine their missions.
COLLECTION
How Optical Systems Work. Optical imaging systems are usually called electro-
optical imagers because the incoming optical signal hits a detector array, where it
is converted to an electrical signal for transmission and storage. They are, for all
practical purposes, telescopes with digital cameras attached. All optical systems
discussed in this chapter and Chapter 10 operate as illustrated in Figure 9.1,
which shows the basic function of a telescope. At the left, light from two distant
objects arrives at the telescope from two slightly different directions. Because of
the relatively great distance to the objects, the light rays from each object are
essentially parallel when they arrive at the telescope. The optics focus the
incoming energy from a light source at a point on what is called the focal plane.
Two dimensions of a telescope (or of any optical system) define its performance:
the size of the aperture and the focal length.
Focal Length. The focal length, F, of the sensor is defined by the distance
between the aperture and the focal plane.
To keep s as large as possible, the optical sensor must have a large focal
ratio, known to photographers as the f number. This is defined as the ratio of the
focal length of the telescope to its diameter, that is, f = F/D. The idea is
illustrated in Figure 9.1. As the focal plane is moved away from the lens, the
focal length F increases and makes the separation s larger. The f number
increases, image separation is better, and the telescope has better resolution.
Better separation, though, comes at a price. The trade-off for larger f is that
while resolution improves (better image quality), there is less light on each pixel.
A camera using an f number of f16 produces a better quality image than it does
when using f2 but at the price of 64 times less light on each pixel. Anyone who
has used a zoom lens on a film camera may have noticed this effect; the image
becomes darker as you zoom in and the f number increases. (This effect is hard
to see in a digital camera; the electronics compensate for the decreased light.)
Increasing the focal length also decreases the field of view. The telescope
can resolve objects better, but it sees a smaller area at any given distance. Figure
9.2 illustrates this constraint. To appreciate this difference, suppose you are
looking at a scene through a cardboard tube that is 1 inch in diameter and 1 inch
long (f = 1). You would be able to see a great deal of the scene. Now replace that
tube with one that is 1 inch in diameter but 20 inches long (f = 20). Very little of
the scene would be visible, as the field of view has been significantly narrowed.
One way to compensate for the decreased light on each pixel is to increase
the lens diameter to admit more light (while increasing the focal length to
improve resolution). To illustrate how this has developed over time:
• The Hexagon (KH-9) satellite, operated during the 1970s and 1980s, did
not match the resolution of the KH-8; its camera had a 20-inch aperture and
focal length of 60 inches, giving it an f of 3.0 and a best image resolution of 2 to
3 feet. But it could cover a much larger area than the KH-8. 4
of view is very narrow and its images cover a relatively small area.
FIGURE 9.2 Effect of Focal Length on Field of View
The other way to compensate for the decreased light on each pixel is to
improve the sensitivity of the detector. In old cameras, this sensing unit was
photographic film. Film cameras that required high resolution or needed to
function at low light levels used a more sensitive film known as high-speed film;
it produced good photographs at higher f numbers. In modern cameras and
intelligence sensors, the detector is a flat matrix of tiny light-sensitive solid-state
devices called a focal plane array (so called because it is placed at the point
where the telescope optics focus incoming light energy—the focal plane in
Figure 9.1). Most such sensors use a charge-coupled device (CCD) for the focal
plane array. Current generation CCDs are much more sensitive than the highest
speed film. For comparison, the NRO’s Corona camera used high-speed film and
provided an image resolution of 8 to 10 feet. The digital camera in the GeoEye-
6
1 satellite, with its better f number and more sensitive CCD detectors, is able to
produce images with 0.41-meter resolution. GeoEye-2, completed in 2013, has
7
an even better f number and still more sensitive detectors, giving it a resolution
of 0.34 meters. 8
If the focal plane array detects visible light, it requires no special cooling.
And such devices are relatively cheap to build. But, increasingly, optical sensors
used in intelligence and earth resources sensing operate in both the infrared and
the visible parts of the spectrum. At the lower frequency (longer wavelength)
part of the infrared spectrum, the detectors in the focal plane array must be
cooled in order to make them more sensitive. Cooled focal plane arrays are much
harder to build and more expensive.
satellite can see a large part of the earth’s surface; an aircraft much less. The
collection satellite potentially can observe a sector anywhere in a whole province
or country at a given moment, but its sensor cannot distinguish fine details. In
contrast, a UAV-mounted camera could read the license plate on an auto or
recognize an individual when the UAV overflies an installation at low altitude.
But the low altitude limits the field of regard; so the camera could only view the
immediate area around the installation.
The detail that can be seen in an image depends on the sensor’s spatial
resolution (that is, the size of the smallest possible feature that can be detected).
Spatial resolution of passive sensors (the special case of radar sensors will be
discussed later) depends in part on the sensor’s field of view (FOV). The FOV is
the angular cone of visibility of the sensor, measured in degrees, as shown in
Figure 9.3. It determines the surface area that is seen from a given altitude at one
moment in time. The size of the area viewed is determined by the FOV and the
distance between the ground and the sensor—the farther the sensor is from the
earth, the larger the area that is viewed.
FIGURE 9.3 Sensor Field of View and Field of Regard
Imaging Sensors. Three types of collection sensors are used for imaging the
earth’s surface from aircraft: UAVs, aerostats, and satellites. Figure 9.4 shows a
comparison of these three types. The following sections discuss how they are
used.
Framing Cameras. The most widely used sensor in remote sensing today is the
framing camera, shown on the left side of Figure 9.4. This sensor will be
familiar to most readers, since most cameras, including smartphone cameras and
video cameras, are framing cameras. It uses conventional camera optics and an
array of detectors located in the focal plane. The framing cameras originally
installed on aircraft and reconnaissance spacecraft such as the Corona (KH-4),
Gambit (KH-8), and Hexagon (KH-9) used photographic film, but almost all
framing cameras now used in intelligence rely on a detector array of CCDs. The
more detectors in the array, the smaller each detector becomes and the better the
imagery resolution becomes. But, as noted earlier, there is a trade-off: a smaller
detector has less light striking it, and consequently, the sensitivity becomes
worse.
An example of a current framing camera design is that carried by the
Global Hawk UAV. It has a 10-inch reflecting telescope that provides common
optics for two framing cameras—one operating in the visible band and one in the
infrared band (3.6 to 5 microns). At its best resolution (called the spot collection
mode), the camera can collect 1,900 frames a day with frame size 2 by 2
kilometers. It can locate targets to within a 20-meter circular error of probability
(meaning that 50 percent of target locations will be accurate to within 20
meters). The camera can also operate in a wide area search mode, covering a
swath up to 10 kilometers wide at lower resolution. 11
Each type of imaging system shown in Figure 9.4 has distinct advantages
and disadvantages. The framing camera provides an image that covers a large
area in one snapshot, but it requires technologically sophisticated planar arrays
of small, sensitive detectors. The cross-track scanner can use a single very
simple detector, but its overall sensitivity suffers because it spends little dwell
time in each of the cells shown in Figure 9.4. The pushbroom imager is a
compromise—it allows more dwell time in each cell than the scanner and is less
complex than the framing camera.
Framing cameras and pushbroom imagers are probably the most commonly
used imaging systems today. Which one works best depends on the mission
requirements. If the system must map very large areas of the earth, then the
pushbroom imager is probably the best bet. Spectral imagers, discussed in
Chapter 10, also tend to use pushbroom imagers because a separate linear array
of detectors is used for each spectral band. If the system is intended to take a
series of images of known target areas, then the framing camera is better; it can
provide the most detailed image of the target area because of its higher
sensitivity.
Newer video surveillance designs can view a wide area at high resolution.
The concept is to use multiple cameras and to optically merge the separate
images to provide both a wide field of view and high spatial resolution. Such
sensors, with a capability to view in both the visible and infrared spectrum, offer
the possibility of nonstop surveillance. One such sensor has demonstrated the
capability to provide continuous, real-time video imagery of an area the size of a
small city with a resolution fine enough to track 8,000 moving objects in its field
of view.13
Space Surveillance. Optical sensors that look from the earth out into space
function in the same way as airborne or spaceborne sensors that look down at
earth. They all use the same type of source: a telescope backed by an array of
sensitive light detectors. But the telescopes used for space situational awareness
are typically much larger and more capable. The field of regard is the
hemisphere limited by the horizon; the field of view is determined by the
telescope design but typically is very narrow because of the need to detect very
small objects.
Optical sensor performance for space sensing is controlled by the same
factors as for earth sensing: Performance is determined primarily by the size of
the optics. In general, larger apertures provide better performance. But
performance is measured differently. The important factor is the visual
magnitude that the sensor can detect.
Visual magnitude (m ) is a measure of the relative brightness of an object. A
v
magnitude near 1. The dimmest stars that can be seen by the unaided eye have
magnitude 6. Satellites have a highly variable m ; their reflectivity changes
v
depending on how much of the satellite is visible (the aspect ratio) and the
material of the visible portion. A typical GEO satellite has a visual magnitude of
between 11 and 13—about the magnitude of the moons of Mars. GEO satellites
can be detected and tracked with telescope apertures on the order of 0.5- to 1-
meter diameter.
• First, the ground site normally must be in darkness while the sun
illuminates the target (the terminator condition described previously). But LEO
satellites may have almost half their orbit in earth’s shadow, making it possible
to track them optically only during several hours before sunrise and after sunset
when the terminator condition is satisfied. A LEO satellite may overfly an
optical site many times each day, but opportunities for optical tracking may only
occur many days apart. For certain satellites, such as sun-synchronous satellites,
favorable lighting conditions may not occur for several months at a time. HEO
and GEO satellites make better targets since they remain illuminated during
much of the night.
• Second, the ground site must have favorable atmospheric conditions.
The inability to operate during adverse weather is a severe limitation for optical
sensors. Clouds, fog, and haze severely reduce an optical system’s ability to
function, while the same conditions have little effect on radars. The best
locations for clear, dark skies are typically at higher elevations. Geographic
locations less subject to adverse atmospheric effects and light pollution also are
desirable.
imaging can work. On April 15, 2012, the French space agency CNES used its
Pleiades Earth observation satellite to capture an image of the European Space
Agency’s Envisat satellite. At a distance of about 100 kilometers, Envisat’s main
body, solar panel, and radar antenna are clearly visible in the figure.
19
PROCESSING
Today, most remote sensing data are recorded in digital format. So almost all
image interpretation and analysis requires digital processing. Digital image
processing typically entails formatting and correcting the data, digital
enhancement to permit better visual interpretation, and sometimes automated
classification of targets and features—all done entirely by computer. In order to
process remote sensing imagery digitally, the data have to be recorded in an
appropriate digital form. Several commercially available software systems have
been developed specifically for such image processing and analysis.
The history of Libya’s chemical warfare plant at Rabta, which dates from
1984, provides an example of how imagery exploitation and analysis works in
practice as well. This plant was mentioned briefly in Chapter 4. According to a
report by the U.S. Office of Technology Assessment,
Libyan government officials adamantly insisted that the Rabta facility was a
pharmaceutical plant, designated Pharma-150. Yet the factory was
unusually large by the standards of the pharmaceutical industry and was
ringed by high fences and 40-foot sand revetments—seemingly excessive
security for an ordinary chemical plant. Since the production facility was
completely enclosed inside a warehouse-like structure, overhead
photography revealed nothing about the process equipment inside, but the
plant’s oversized air-filtration system suggested that it was intended for the
production of toxic chemicals.
It was not until August 1988, however, that the CIA obtained more solid
evidence that the Rabta plant was engaged in CW agent production.
Following a partial test run of the production process, an accidental spill
occurred as highly toxic wastes were being transferred for disposal outside
the plant. The resulting cloud of fumes killed a pack of wild desert dogs in
the vicinity of the plant. Their bodies, detected by satellite, indicated that
the plant was producing chemicals of warfare toxicity. 22
Imagery analysis also has to deal with the problem of denial and deception,
which is increasing as more countries orbit imaging satellites. A subsequent
attempted deception at the Rabta plant provides an example. According to the
Office of Technology Assessment report, the Rabta plant was believed to have
been destroyed by fire on March 13, 1990. But the French SPOT-1 satellite
photographed the facility on March 18, and it appeared to be intact. The Libyans
had created the illusion of a major fire for overhead imagery by painting scorch
marks on the building roof and burning several truckloads of old tires to produce
black smoke. The Libyans also had sent ambulances to the area to help maintain
the deception.23
For a given optical system, the NIIRS values get higher as the collector gets
closer to the target. To illustrate typical NIIRS performance, the Global Hawk
UAV can deliver NIIRS 6 visible imagery at its normal operating altitude in its
wide area search mode. The infrared sensor at the same altitude can deliver
NIIRS 5 imagery. 26
Analysis Example: The Arab Spring. The bulk of earth imagery intelligence is
derived from government-owned systems. Increasingly, though, imagery from
commercial satellites such as GeoEye is being used by intelligence agencies. 27
The quality of such imagery has improved to the point that it is very useful for
intelligence and not just for governments. It can be used by NGOs, corporate
entities, or even private citizens to produce useful intelligence, as the following
example illustrates.
TABLE 9.1 Description of NIIRS Rating Scale
Beginning in February 2011, many parts of the Middle East and North
Africa were disrupted with the advent of what became known as the “Arab
Spring.” The Arab Spring began in Tunisia and spread from there. A popular
revolt developed against the Qaddafi regime in Libya, and the ensuing conflict
caused large numbers of Libyans to flee the country.
Figure 9.7 is a GeoEye image of the main border crossing between Libya
and neighboring Tunisia at Ras Ajdir, Libya, early in the conflict. The image was
taken on March 3, 2011. It illustrates the sort of intelligence that is needed by
governments and by NGOs that must respond to refugee crises. Imagery analysts
at IHS Jane’s concluded that several thousand displaced Libyans were gathered
in open or makeshift camps on the Tunisian side. On the Libyan side, the
analysts noted that cross-border traffic had been suspended and that choke points
had been set up to control or block traffic. As the conflict continued and spread
28
Search for New Satellites. Occasionally, optical systems must conduct searches
to detect new satellites and to reacquire tracking on satellites that have been lost.
Optical search for satellites is done by using a telescope drive. The drive moves
the telescope across the sky at the same rate that the stars appear to move. This
keeps the distant stars in the same positions in the field of view. As the telescope
slowly moves, its camera takes very rapid electronic snapshots of the field of
view. Star images, which remain fixed, are electronically erased. Satellites,
however, do not remain fixed, and their movements show up as tiny streaks that
can be viewed on a console screen. In the processing phase, computers measure
these streaks and use the data to determine the position and calculate the orbit of
a satellite.
30
DISSEMINATION
The dissemination of visible imagery long has been driven by a demand for
speed. The intelligence conveyed in imagery is perishable, especially in crises
and in tactical military and law enforcement operations. But all customers, from
the U.S. president on down, want the imagery as quickly as they can get it.
When the imagery product came from photographic film, quickly meant
days or even weeks, as noted earlier. The wide use of digital imaging reduced
that time to hours, then to minutes. Today, video imagery is available to all
customers in real time, which is one of the reasons it is so attractive. But some
imagery must be exploited and analyzed to produce intelligence, and the
presence of a human (the imagery analyst) in the process means that there is a
lower limit to the time for dissemination— perhaps minutes to hours.
Classification of the imagery product is another dissemination issue that has
been largely resolved. Many customers (most law enforcement officers and
foreign nationals, for example) have no security clearance. So the imagery needs
to have the lowest possible classification, preferably unclassified. If the means
for obtaining the imagery do not need to be kept secret, this is not a problem. For
example, aircraft and UAVs are widely known as vehicles that collect imagery,
so the material can be released at an unclassified or at most secret level. And
commercial satellite imagery is unclassified.
On the other hand, when special capabilities are used to collect the imagery
or unique features of the imagery must be protected, a high classification and
very limited distribution are required, based on a pressing need to know. This
means that some entities in the very large customer set for visible imagery (such
as foreign partners) will not have access to the material at all.
crates for toolboxes, rotors, or similar clues help identify specific contents of the
crates.
34
Cratology has been used for many years to identify movements of military
hardware. An early example of cratology success occurred at the beginning of
the Cuban Missile Crisis in 1962. On September 28, imagery analysts observed
crates on the deck of a Soviet ship bound for Cuba; the crates were uniquely
designed to ship IL-28 medium bombers. This report, along with reports of
ballistic missiles being stationed in Cuba, led to a U-2 flight in October that
brought back pictures of the ballistic missile sites under construction.35
Press reports claim that during August 2006 a U.S. reconnaissance satellite
observed crates being loaded onto an Iranian transport aircraft near Tehran.
Based on the dimensions of the crates, U.S. intelligence analysts reportedly
concluded that Iranian C-802 Noor antiship cruise missiles were being loaded
onto the aircraft. According to the press report, the identification set off a chain
of diplomatic action that kept the missiles from being delivered to Hezbollah
guerrillas who were fighting Israeli forces in Lebanon. 36
Space Catalogs. Most countries that maintain space surveillance systems also
maintain a catalog of space objects—both those of intelligence significance and
of debris. These libraries have a specific name; they are called space object
catalogs or space catalogs. France, the United States, Russia, and the European
Space Agency, for example, all have their own space catalogs. These catalogs
quickly go out of date and have to be maintained. In the United States, updates
are handled by the Space Surveillance Network. About 20,000 objects are
maintained in the U.S. catalog.
Structure
Optical imaging of the earth’s surface is organizationally fragmented, based in
part on the different missions that it supports and based in part on the diversity of
the customer set. The type of collection platform used also affects the
organizational structure that is adopted. Following is a general summary of the
structural breakout.
Prior to the Cold War, very little use was made of imagery by nationallevel
customers. Military aircraft conducted photo reconnaissance flights to support
military operations in the theater. That situation changed during the Cold War.
As noted in Chapter 6, the need for national-level, detailed knowledge of
strategic targets in the Soviet Union and the PRC, along with the sensitive nature
of U-2 collection, drove the United States to centralize the processing and
exploitation of imagery acquired by U-2 aircraft.
With the shift to satellite-borne imaging systems, the national structure
remained centralized to handle the large-area coverage and high volume. The
early Corona imaging satellite used film cameras, with the film returned to earth
days or even weeks after the images had been taken. The delay was frustrating
for policymakers, who often needed current information about developing crises
around the world. The move to electro-optical sensors speeded the processing
and allowed a capability for imagery to be sent directly to many customers. The
resulting competition for limited collection assets required a central
prioritization system, discussed in Chapter 18.
The U.S. pattern of a central organization for handling national
requirements is followed in other countries that employ imaging satellites.
Optical imagery to support national requirements usually is centralized in an
organization that provides imagery products for a wide range of policymakers
and military customers. In the United States, the National GeospatialIntelligence
Agency (NGA) has this responsibility.
Aircraft and UAV imagery coverage may sometimes be done at the national
level, but military forces are the primary customers for this imagery. Military
tactical imagery support typically is organic; that is, it is handled by airborne
reconnaissance platforms (aircraft and UAVs) in the theater of operation.
Processing and exploitation centers are located in the theater, and the imagery is
distributed to units in the theater. Law enforcement organizations have a similar
structure.
Commercial companies such as France’s Spot Image operate the Système
Pour l’Observation de la Terre (SPOT), a constellation of imagery satellites, and
sell the product. GeoEye, Inc., a U.S. company, sells satellite imagery to
companies such as Microsoft and Google, and to government entities such as
NGA.
The mission of tracking and identifying space objects (to include satellites,
space debris, and ballistic missile reentry vehicles) from the earth’s surface is
typically given to the military. The United States has two such military
organizations with different space sensing missions. The Space Surveillance
Network under the U.S. Strategic Command is responsible for satellites and
space debris. The U.S. Missile Defense Agency has its own system for detecting
and tracking ballistic missiles in flight. Russia’s Space Surveillance System is
part of the Air and Space Defense Forces, a branch of Russia’s Armed Forces.
Europe has its European Space Agency with a planned European space
surveillance system. But individual European countries maintain separate
systems to support national needs. France has its own space surveillance system,
and Germany has its Space Situational Awareness Center.
Summary
Optical imaging systems are usually called electro-optical imagers, because the
incoming optical signal hits a detector array, where it is converted to an electrical
signal for transmission and storage. Electro-optical imagers are attractive
because they can cover large areas of the earth’s surface, with spatial resolutions
that are sufficient for obtaining useful signatures and doing imagery
interpretation.
Optical sensors are, for all practical purposes, telescopes with cameras
attached. The optics focus the incoming energy at a point called the focal point.
Two dimensions of a telescope (or of any optical system) define its performance:
the size of the aperture and the focal length. In order to resolve separate targets,
it is necessary to make the ratio of focal length to aperture diameter (the f
number) as large as possible. The trade-off is that increasing the f number both
narrows the sensor’s field of view and decreases its sensitivity.
An electro-optical imager uses an array of sensitive detectors located in the
focal plane that detects incoming light from the entire field of view. The goal is
to make the detectors as small as possible (to improve resolution) and as
sensitive as possible (to detect weak signals). Each detector collects light energy
from a specific resolution cell in the target area, and that light creates one pixel
in the resulting image.
Three types of EO imagers are widely used. Simplest is the cross-track
scanner, which uses a scanning mirror to focus the light energy from each
resolution cell onto a single detector and scans through all of the resolution cells
in the field of view. Because it spends little time staring at any part of the target
area, its sensitivity is poor. A pushbroom imager uses a linear array of detectors
to sweep the target area as the platform moves, giving it better sensitivity than a
cross-track scanner. Most complex and most common is the framing camera,
which uses a detector array to provide the best sensitivity of the three.
In order to get an image that is useful for intelligence, at least two
processing functions have to be carried out. The first is preprocessing:
radiometric corrections are made to eliminate noise and to accurately represent
the intensity of features in the image, and geometric corrections are done to
remove image distortions. The second is image enhancement, to improve the
appearance of the imagery to assist in visual interpretation and analysis by
enhancing contrast and enhancing specific spatial patterns such as edges.
Processing also can involve using false color in order to display image features
that are not in the visible spectrum.
Image exploitation and analysis relies on identifying a unique signature in
the image. One example is cratology, the discipline of identifying the contents of
a crate by its physical measurements. Exploitation is helped by the use of stereo
imagery, created by imaging a target area from two different angles to obtain a 3-
D image.
Ground-based optical sensing of satellites relies on large telescopes, usually
located on mountaintops to avoid cloud cover and reduce atmospheric distortion.
Their purpose is to either track a satellite to determine its orbit or to identify the
satellite. A satellite often can be identified by its unique signature—a
combination of the satellite’s orbit, its shape, and its reflectivity characteristics.
Space-based optical sensors can obtain high-resolution images of satellites
to aid identification, because the atmosphere is not a factor and the image can be
obtained at closer ranges than is possible with ground-based imaging.
NOTES
1. Katie Walter, “Surveillance on the Fly,” Science and Technology Review (October 2006), Lawrence Livermore National Laboratory, accessed 22 September 2012 at
www.llnl.gov/str/Oct06/Pennington.html.
2. National Reconnaissance Office, “Corona Fact Sheet,” accessed 14 September 2012 at http://www.nro.gov/history/csnr/corona/factsheet.html.
3. National Reconnaissance Office, “Gambit 3 (KH-8) Fact Sheet,” accessed 14 September 2012 at http://www.nro.gov/history/csnr/gambhex/Docs/GAM_3_Fact_sheet.pdf.
4. National Reconnaissance Office, “Hexagon (KH-9) Fact Sheet,” accessed 14 September 2012 at http://www.nro.gov/history/csnr/gambhex/Docs/Hex_fact_sheet.pdf.
5. Satellite Imaging Corporation, “GeoEye-1 Satellite Sensor,” accessed 14 September 2012 at http://www.satimagingcorp.com/satellite-sensors/geoeye-1.html.
6. National Reconnaissance Office, “Corona Fact Sheet,” accessed 14 September 2012 at http://www.nro.gov/history/csnr/corona/factsheet.html.
7. Satellite Imaging Corporation, “GeoEye-1 Satellite Sensor,” accessed 14 September 2012 at http://www.satimagingcorp.com/satellite-sensors/geoeye-1.html.
8. Satellite Imaging Corporation, “About GeoEye-2,” accessed 29 September 2012 at http://launch.geoeye.com/LaunchSite/about/Default.aspx.
9. Both SPOT and Ofeq are acknowledged to be intelligence collectors by the French (http://www.spotimage.fr/web/en/1803-defence-intelligence-security.php) and the Israelis
(http://www.haaretz.com/hasen/spages/869771.html), respectively, accessed 22 September 2012.
10. Jean-Luc Lamard, Catherine Gaudin-Delrieu, David Valentini, Christophe Renard, Thierry Tournier, and Jean-Marc Laherrere, “Design of the High Resolution Optical Instrument for the
Pleiades HR Earth Observation Satellites,” Proceedings of the 5th International Conference on Space Optics (Tolouse, France, March 30–April 2, 2004), 149–156, accessed 22 September
2012 at http://articles.adsabs.harvard.edu//full/2004ESASP.554.149L/0000149.000.html.
11. Airforce-technology.com, “RQ-4A/B Global Hawk High-Altitude, Long-Endurance, Unmanned Reconnaissance Aircraft, USA,” accessed 22 September 2012 at http://www.airforce-
technology.com/Projects/rq4-global-hawk-uav/.
12. Pablo O. Arambel, Jeffrey Silver, and Matthew Antone, “Signature-Aided Air-toGround Video Tracking,” Conference Proceedings of the 9th International Conference on Information
Fusion (Florence, Italy, July 10–13, 2006).
13. Walter, “Surveillance on the Fly.”
14. USAF, “Ground-Based Electro-optical Deep Space Surveillance,” Fact Sheet, accessed 22 September 2012 at http://www.af.mil/information/factsheets/factsheet.asp?id=170.
15. USAF Photo, accessed 25 September 2012 at http://www.af.mil/shared/media/photodb/photos/060501-F-0000S-003.jpg.
16. Jayant Sharma, Grant H. Stokes, Curt von Braun, George Zollinger, and Andrew J. Wiseman, “Toward Operational Space-Based Space Surveillance,” Lincoln Laboratory Journal, Vol.
13, No. 2 (2002), 309–334.
17. Estrella Olmedo, Noelia Sanchez-Ortiz, and Mercedes Ramos-Lerate, “Orbits and Pointing Strategies for Space Based Telescopes Into an European Space Surveillance System,”
Proceedings of the 5th European Conference on Space Debris (April 2009).
18. FAS Space Policy Project, accessed 22 September 2012 at http://www.fas.org/spp/military/program/track/index.html.
19. Tariq Malik, “Huge, Mysteriously Silent Satellite Spotted by Another Spacecraft,” Space.com (April 20, 2012), accessed 26 September 2012 at http://www.space.com/15369-
mysteriously-silent-envisat-satellite-space-photos.html.
20. Helen Anderson, “Edge Detection for Object Recognition in Aerial Photographs,” University of Pennsylvania Department of Computer and Information Science Technical Report No.
MS-CIS-87-14, 1987, accessed 22 September 2012 at http://repository.upenn.edu/cgi/viewcontent.cgi?article=1634&context=cis_reports.
21. Dino Brugioni, Eyeball to Eyeball: The Inside Story of the Cuban Missile Crisis (New York: Random House, 1990), 33.
22. U.S. Congress, Technologies Underlying Weapons of Mass Destruction, OTA-BfPISC-115 (Washington, DC: U.S. Government Printing Office, December 1993), 42–43
23. Ibid., 44.
24. National Reconnaissance Office, “Gambit 3 (KH-8) Fact Sheet,” accessed 14 September 2012 at http://www.nro.gov/history/csnr/gambhex/Docs/GAM_3_Fact_sheet.pdf.
25. John M. Irvine, “National Imagery Interpretability Rating Scale (NIIRS): Overview and Methodology,” in Wallace G. Fishell, ed., Proceedings of SPIE, 3128, Airborne Reconnaissance
XXI (November 21, 1997), 93–103.
26. Rand Corporation, “Exploring Advanced Technologies for the Future Combat Systems Program,” Chapter 2 (2002), accessed 22 September 2012 at
http://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1332/MR1332.ch2.pdf.
27. Richard A. Best Jr., “Imagery Intelligence: Issues for Congress,” CRS Report for Congress: 20 (April 12, 2002).
28. GeoEye, “Analysis Report: Activity on the Libyan/Tunisia Border Using GeoEye-1 Imagery,” Image taken on 3 March 2011, accessed 1 October 2012 at
http://www.geoeye.com/CorpSite/assets/docs/gallery/Libya_Border_GeoEye_Imagery_IHS_Janes_Analysis_Mar2011.pdf.
29. Anthony L. Kimery, “IMINT Processing Problems Impact War on Terror,” HSToday (April 26, 2010), accessed 22 September 2012 at http://www.hstoday.us/blogs/the-kimery-
report/blog/imint-processing-problems-impact-war-onterror/4961ddab3a70e6883667bafe91fc0c0d.html.
30. FAS Space Policy Project, accessed 22 September 2012 at www.fas.org/spp/military/program/track/geodss.htm.
31. USAF, “Air Force Maui Optical and Supercomputing Site (AMOS)” (April 30, 2012), accessed 22 September 2012 at http://www.kirtland.af.mil/library/factsheets/factsheet.asp?
id=16930.
32. Melissa Kelly, John E. Estes, and Kevin A. Knight, “Image Interpretation Keys for Validation of Global Land-Cover Data Sets,” Journal of the American Society for Photogrammetry
and Remote Sensing, Vol. 65, No. 9 (September 1999), 1041–1050.
33. Thaxter L. Goodell, “Cratology Pays Off,” CIA Center for the Study of Intelligence, Studies in Intelligence Vol. 8, No. 4 (Fall 1964), 1–10.
34. Dino Brugioni, Eyeball to Eyeball: The Inside Story of the Cuban Missile Crisis (New York: Random House, 1990), 73.
35. Ibid.
36. John Diamond, “Trained Eye Can See Right Through Box of Weapons,” USA Today, (August 17, 2006), accessed 22 September 2012 at www.usatoday.com/news/world/2006-08-17-
missiles-iran_x.htm.
10. Radiometric and Spectral Imaging
Most images that are used in intelligence are collected in the visible band, as
discussed in Chapter 9. But imaging outside that band, especially ultraviolet and
infrared imaging, can provide much useful intelligence that does not appear in
visible imagery. As an example from the natural world: We noted in Chapter 7
that reindeer can see ultraviolet (UV) light. Their eyes evolved to have that
capability for a reason. Lichen, animal fur, and urine absorb UV light, while
snow reflects it strongly. So their UV vision allows the reindeer to see dark areas
against the snow to find their next meal (lichen) while avoiding being the next
meal for wolves by spotting the furry wolves and areas where the wolves have
marked their territory. Simplistic as that example may seem, radiometric and
spectral imaging do similar things for us in intelligence. That is the subject of
this chapter.
Let’s begin with some important definitions.
RADIOMETRIC IMAGING
Thermal imaging is the term for radiometric imaging that is done in the
emissive band. It can be done either day or night, because the radiation is
emitted rather than reflected. It is used for a variety of intelligence applications.
In military reconnaissance, it is used to detect tanks, trucks, and aircraft on the
ground and ships at sea—all of which, when operating or having recently
operated, are hotter than their surroundings. During the Gulf War (Operation
Desert Storm, 1990 to 1991), U.S. forces routinely determined the status of Iraqi
military equipment by monitoring heat emissions using thermal imaging.
Nuclear plant activity and many industrial processes produce thermal
patterns that can be monitored for intelligence purposes. Some countries have
1
also tested the use of infrared imagery to remotely track submerged submarines.
The technique depends on the tendency of water displaced by the submarine to
rise to the surface, creating a wake that has a different temperature from the
surrounding ocean and therefore can be detected by infrared sensors. 2
SPECTRAL IMAGING
Process
PLANNING
COLLECTION
The Optical Spectrum. Starting in the millimeter wave band and moving up in
frequency toward the optical spectrum, increasingly the atmosphere affects the
propagation of EM waves. Figure 10.1 illustrates the absorption that occurs
across the EM spectrum. Above the green shaded area in the figure, the
atmosphere effectively blocks the passage of EM energy. Below the shaded area,
the energy passes through with little loss. In the shaded region, the losses may or
may not allow a sensor to obtain a readable signal.
At any time, a given spectral sensor will only observe a small part of the
overall spectrum shown in Figure 10.1. The sensor is designed only to collect
radiation within a specific bandwidth or set of narrow bands for a specific
purpose. Chapters 7 and 9 discussed the division of the optical spectrum into two
major regions—reflective and emissive. Solids and liquids are usually examined
in the reflective spectral region from about 0.5 µm to about 2.5 µm. A source of
radiant energy—typically the sun—is necessary to produce spectra in this
reflective spectral region. The emissive region, which is found at longer
wavelengths, is more typically used to examine gases.
The infrared part of the spectrum is subdivided into smaller sections, as
discussed in Chapter 7. Again, there are no standard divisions. Following are
some of the commonly used ways to define divisions:
Near-Infrared (NIR). The NIR band is closest to visible light and extends from
0.75 µm to 1.5 µm in wavelength. Night vision devices work in this band. The
longer wavelengths in the NIR band reflect uniquely from minerals, crops, and
vegetation and moist surfaces; different tree types can be distinguished, for
example. The 0.76 to 0.9 µm part of the band is useful for shoreline mapping.
The band is used in imaging to counter the effectiveness of camouflage; poorly
designed camouflage reflects differently than the surrounding vegetation. Image
intensifiers are commonly used in this part of the spectrum up to about 1 micron;
an image intensifier amplifies the weak incoming NIR signal to provide a
viewable image in low-light conditions.
FIGURE 10.1 Atmospheric Attenuation of EM Waves
Short Wavelength Infrared (SWIR). The short wavelength infrared band extends
from 1.5 µm to 3 µm. Sensors in this band are used to detect the presence of
water and for vegetation analysis; oil on water can be discriminated and the
moisture content of soil and vegetation can be determined. SWIR signals can
penetrate clouds to a limited extent.
Although the SWIR band is considered as being in the reflective part of the
IR band, it is used to detect a class of emissions that have intelligence
significance. The hot exhausts of ballistic missiles during the boost phase of
flight emit a strong signature in this band; explosions also create an SWIR band
signature. The overhead persistent infrared sensors discussed in Chapter 9 tend
to function in this band for characterizing missiles in boost phase and to
determine the type of munitions causing an explosion.
Long Wavelength Infrared (LWIR). The long wavelength infrared band is a major
atmospheric window extending from 8 µm to 15 µm. The region near 10
microns is often called the thermal imaging region because objects near room
temperature emit more strongly in this region. LWIR sensors use this signature
to obtain a completely passive image of the earth based on thermal emissions
only, and they require no external light or thermal source such as the sun. This is
the primary band used to characterize gaseous effluents for intelligence
purposes. Many production processes create signatures in this band. Forward-
looking infrared (FLIR) systems that are mounted on vehicles and aircraft also
use this area of the spectrum to view the surrounding region during darkness.
Detectors used in this band generally must be cooled to obtain acceptable
sensitivity. This band is sometimes also called the far infrared, but many
definitions treat this as a separate band, as discussed next.
Far Infrared. The far infrared band extends above the 15-µm wavelength to the
millimeter wave range. For overhead imaging purposes, the cutoff is around 30
µm, since the atmosphere is opaque at longer wavelengths.
In Figure 10.2, one can observe that darker objects in the visible image tend
to be lighter in the radiometric image and the converse. This is a characteristic of
radiometry: darker objects tend to both absorb and emit energy more strongly
than do light objects, so they show up more brightly.
overhead nonimaging infrared (ONIR), a term that did not adequately describe
the result. Figure 10.4 illustrates the OPIR signature obtained from a HEO
satellite of a Delta IV launch on November 4, 2006. The launch vehicle itself is
8
not visible in the picture, but the intense IR plume is clearly visible. As the
figure shows, the product of OPIR is an image, though not a high-resolution
image.
For many years, the DSP satellite was the primary sensor for OPIR
collection. It has been replaced by the Space-Based Infrared System (SBIRS).
Figure 10.5 shows an artist’s conception of the SBIRS satellite. Satellites like
9
this rely on IR to detect and report ballistic missile launches and other infrared
events having intelligence significance. SBIRS reportedly has higher sensitivity
and can more accurately estimate the missile location, launch point, and impact
point than did the DSP satellites. SBIRS has been certified by NGA as a
technical intelligence collector.
10
In 2009, France launched its own version of the SBIRS satellite, called
Spirale. It is a demonstration system, designed to test the concept of a future
space-based operational system for providing the French with an early warning
of a missile attack. Two Spirale satellites, launched into a HEO orbit, are
collecting imagery in several infrared bands.
11
FIGURE 10.5 SBIRS Satellite
Hyperspectral and Ultraspectral Imaging. HSI and USI imagers have the same
basic design as MSI imagers but are more complex. They collect hundreds or
thousands of simultaneous images in very narrow spectral bands, giving them
very high spectral resolution. That allows them to discriminate between different
targets based on their spectral response in each of these narrow bands. HSI and
USI images therefore contain far more spectral information than MSI images,
making them much more information-rich but also more difficult to process and
analyze. They have the potential to provide details about an intelligence target
that simply cannot be achieved with conventional or MSI imagery. For example,
high spectral resolution in the LWIR band is necessary for the detection,
location, identification, and characterization of gases. However, processing and
analyzing HSI and USI data is a difficult and time-consuming process, often
requiring custom software and very expensive expert labor.
So acquiring more wavelength bands, and then processing them in separate
images, allows better identification of the target. As Figure 10.7 indicates,
increasing the number of spectral bands allows a progression from detecting a
target, to classifying it, and then to identifying a specific object or gas. How this
is done is discussed in the section on processing and exploitation. Here, as in
other areas, one encounters a trade-off: MSI imagers have less spectral
resolution but typically cover large geographical areas. Commercial and civil
MSI satellites such as Landsat, Ikonos, and Quickbird provide extensive area
coverage, at relatively low spectral and geographical resolution. HSI satellites
provide limited area coverage with good spectral resolution.
The attractiveness of the HSI technique resulted in a rush to deploy
operational HSI systems to support coalition operations in Afghanistan. One
such system reportedly was deployed on the U.S. TacSat 3, launched in May
2009.17
FIGURE 10.7 Spectral Imaging Resolution and Levels of Information
Obtained
PROCESSING
After it has been collected, radiometric or spectral imagery has to go through the
three phases of processing, exploitation, and analysis so that users can make
sense of the signatures that have been collected.
The processing discussed in Chapter 9 for imagery has to be done for
radiometric processing and is an initial step before the spectral processing
begins. For example, geometric corrections are used to accurately fit the image
to a map of the target area. The raw data have to be adjusted using radiometric
(intensity) and spectral calibrations prior to exploitation. In order to be useful,
the signatures or images also must be corrected for the effects of the atmosphere
on the reflected or emitted radiant energy as it travels between the ground target
and the collector.
Calibration is important in spectral imaging for the same reason as in the
commercial world: People would not want to purchase a digital camera if they
could not be assured that the colors in the scene would be faithfully reproduced
in the image, and they would generally be displeased if the image were much
brighter or darker than expected. Calibration is necessary to ensure faithful
reproduction of image intensity and spectral characteristics.
The next step involves a series of image transformations—operations
similar in concept to those for image enhancement that were discussed in
Chapter 9. The processing is considerably more complex for spectral signatures.
Unlike image enhancement operations, which are normally applied only to a
single channel of data at a time, spectral image transformations involve
combined processing of data from multiple spectral bands. The images have to
be manipulated to combine and transform the original bands into new images
that better display or highlight certain features in the scene.
The processing of imagery that includes nonvisible bands presents special
challenges. A camera may be able to obtain images in the nonvisible part of the
spectrum, but our unaided eyes cannot see those parts. Therefore, a major
challenge of such imagery is to somehow represent the nonvisible part in the
visible spectrum so that it can be exploited and analyzed. The solution is to use
false color. A commonly used technique, for an image that must include the near
infrared band, is to shift all colors in wavelength approximately 0.15 microns to
a higher-frequency (shorter wavelength) part of the spectrum. The result is that a
green object is depicted as blue, a red object as green, and an infrared reflection
as red. Blue objects cannot be depicted and appear black. Another technique is
shown in Figure 10.8, a false color image taken by NASA’s Terra satellite. This
23
vegetation. As the figure illustrates, each pixel has a unique spectral signature of
intensity versus wavelength.
This easier approach runs into a major snag, though. It assumes that the
pixels containing the target are pure, that is, the target material fills the entire
pixel and is not mixed with any background material. That seldom happens. A
hyperspectral or ultraspectral image pixel will typically have more than one
material present in it. The result will be a composite spectrum for that pixel—
that is, a combination of the spectra of each individual material present. The
composite spectrum has to be resolved into its individual components, assuming
that the spectrum of each pure component is present in the spectral library. For
example, a gas plume may be transparent, so any pixel containing the plume will
be a mixture of the plume and the ground beneath it. The pixel spectra in this
case will not resemble the target spectrum unless the background material can
somehow be suppressed. 30
DISSEMINATION
Structure
A number of military, intelligence, and civilian organizations conduct
radiometric and spectral imaging to support their customers. So all steps in the
collection process are fragmented. The structure is similar to that for optical
imaging, but the customer set is much narrower, and time usually is not as
critical.
As with visible imaging, spectral sensing and imaging is conducted to serve
civilian, military, intelligence, and other governmental purposes. In the United
States, both NOAA and NASA, as well as all the military services, conduct
radiometric or spectral imaging. Law enforcement organizations increasingly are
making use of the capability.
Summary
Radiometric and spectral imaging are used in intelligence for many of the same
purposes as the visible imagers discussed in Chapter 9. But the signatures they
produce give additional insights about their targets. While the images can be
produced in both the reflective (including visible) and emissive parts of the
spectrum, some of the most useful intelligence is produced in the emissive part,
where thermal imaging is done.
Radiometric imaging produces a single image centered on a wavelength
somewhere in the optical or microwave spectrum. The features that can be
extracted from the image depend on the wavelength selected. For reflective
imaging:
• In the visible part of the spectrum, three bands often are imaged
separately—red, blue, and green. Each band can highlight different features or
objects in the image.
• The NIR band is the fourth common band; it is closest to visible light
and extends from 0.75 to 1.5 µm in wavelength. Night vision devices work in
this band. The longer wavelengths in the NIR band reflect uniquely from
minerals, crops and vegetation, and moist surfaces.
• The SWIR band extends from 1.5 to 3 µm. Images in this band are used
to detect the presence of water and for vegetation analysis based on reflective
signatures.
Thermal imagers are used in both the microwave and infrared parts of the
spectrum. They create images that rely on heat-generated emissions from the
target. Infrared radiometers have better resolution than microwave radiometers,
but they cannot see through clouds as the latter can. Space-based infrared
radiometers are used to detect ballistic missile launches and atmospheric nuclear
detonations. Two of the thermal bands find extensive intelligence use:
NOTES
1. Alfred J. Garrett, Robert J. Kurzeja, B. Lance O’Steen, Matthew J. Parker, Malcolm M. Pendergast, and Eliel Villa-Aleman, “Post-launch Validation of Multispectral Thermal Imager
(MTI) Data and Algorithms,” U.S. Department of Energy Report No. WSRC-MS-99-00423 (1999).
2. Guo Yan, Wang Jiangan, and He Yingzhou, “Detecting the Thermal Track of Submarines by Infrared Imagery,” Wuhan Haijun Gongcheng Xueyuan Xuebao (June 1, 2002), 89.
3. John A. Adam, “Peacekeeping by Technical Means,” IEEE Spectrum, (July 1986), 42–80.
4. Alfred J. Garrett, Robert J. Kurzeja, B. Lance O’Steen, Matthew J. Parker, Malcolm M. Pendergast, and Eliel Villa-Aleman, “Post-launch Validation of Multispectral Thermal Imager
(MTI) Data and Algorithms,” U.S. Department of Energy Report No. WSRC-MS-99-00423 (1999).
5. M. R. Fetterman, J. Grata, G. Jubic, W. L. Kiser, Jr., and A. Visnansky, “Simulation, Acquisition and Analysis of Passive Millimeter-Wave Images in Remote Sensing Applications,” Opt.
Express 16, 20503–20515 (2008), accessed 23 September 2012 at http://www.researchgate.net/publication/23640558_Simulation_acquisition_and_analysis_of_passive_millimeter-
wave_images_in_remote_sensing_applications.
6. Daniel W. Banks, Robert C. Blanchard, and Geoffrey M. Miller, “Mobile Aerial Tracking and Imaging System (MATrIS) for Aeronautical Research,” NASA/TM-2004-212852 (August
2004).
7. National Academy of Sciences, Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty (Washington, DC: National Academies Press, 2002).
8. USAF Briefing, “Infrared Space Systems Wing: Contributions to Transforming Space” (November 6, 2007), accessed 22 September 2011 at
http://www.californiaspaceauthority.org/conference2007/images/presentations/071106-1000b-McMurry.pdf.
9. Image accessed 3 October 2012 at http://commons.wikimedia.org/wiki/File:SBIRS-GEO_2.jpg.
10. USAF, “Infrared Space Systems Directorate,” accessed 23 September 2012 at http://www.losangeles.af.mil/library/factsheets/factsheet.asp?id=5330.
11. “France Accepts Spirale Early Warning System Demonstrator,” Defense Technology News (May 20, 2009), accessed 23 September 2012 at www.defencetalk.com/france-spirale-space-
early-warning-system-19033/.
12. Carey Sublette, “Report on the 1979 Vela Incident” (September 1, 2001), accessed 23 September 2012 at http://nuclearweaponarchive.org/Safrica/Vela.html.
13. The National Security Archive, “The Vela Incident: Nuclear Test or Meteoroid?” (May 5, 2006), accessed 23 September 2012 at
www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB190/index.htm.
14. Rulon Mayer, Richard Priest, Christopher Stellman, Geoffrey Hazel, Alan Schaum, Jonathon Schuler, and Michael Hess, “Detection of Camouflaged Targets in Cluttered Backgrounds
Using Fusion of Near Simultaneous Spectral and Polarimetric Imaging,” Naval Research Laboratory Report (August 8, 2000).
15. Michael J. Duggin, “Factors Controlling the Manual and Automated Extraction of Image Information Using Imaging Polarimetry,” Proceedings of SPIE, Vol. 382, No. 85, accessed 23
September 2012 at http://www.deepdyve.com/lp/spie/factorscontrolling-the-manual-and-automated-extraction-of-image-2ua10wr8HM/1.
16. Karen St. Germain, Peter Gaiser, and Mustufa Bahrain, “Polarimetric Radiometry and Ocean Surface Wind Vector: From Windsat to CMIS,” accessed 23 September 2012 at
www.ursi.org/Proceedings/ProcGA05/pdf/F10.2(01469).pdf.
17. Lewis Page, “New Prototype US Spy Satellite Rushed into Active Use,” Space (June 11, 2010), accessed 23 September 2012 at
http://www.theregister.co.uk/2010/06/11/artemis_goes_active/.
18. Jet Propulsion Laboratory, “AVIRIS Airborne Visible/Infrared Imaging Spectrometer,” accessed 23 September 2012 at http://aviris.jpl.nasa.gov/.
19. Paul G. Lucey, Tim J. Williams, Michael E. Winter, and Edwin M. Winter, “Two Years of Operations of AHI: A LWIR Hyperspectral Imager,” Proceedings of SPIE, 4030, No. 31–40,
accessed 23 September 2012 at http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=903351.
20. Space Daily, “EO-1 Offers First Hyperspectral Imager” (January 17, 2001), accessed 23 September 2012 at www.spacedaily.com/news/eo-sats-01b.html.
21. “EnMAP—Germany’s Hyperspectral Satellite for Earth Observation,” German Aerospace Center, accessed 30 September 2012 at http://www.dlr.de/dlr/en/desktopdefault.aspx/tabid-
10379/567_read-421/.
22. Robert Plemmons, Wake Forest University, “Tensor Methods for Space Object Identification Using Hyperspectral Data,” Slides 30–36, accessed 23 September 2012 at
http://www.cs.cornell.edu/cv/TenWork/Slides/Plemmons.pdf.
23. NASA Image of the Day, posted November 8, 2007. A public domain image, accessed 23 September 2012 at http://earthobservatory.nasa.gov/IOTD/view.php?id=8196.
24. Gary A. Shaw and Hsiao-hua K. Burke, “Spectral Imaging for Remote Sensing,” Lincoln Laboratory Journal, Vol. 14, No. 1 (2003), 4, accessed 30 September 2012 at
http://www.ll.mit.edu/publications/journal/pdf/vol14_no1/14_1remotesensing.pdf.
25. Edward Ashton, Brian Fianagan, and Sherry Olson, “Analyzing Hyperspectral Data,” The Edge (MITRE Corporation publication), (September 1999), Vol. 3, No. 3, 1, accessed 23
September 2012 at www.mitre.org/news/the_edge/september_99/first.html.
26. W. F. Belokon, M. A. Emmons, W. H. Fowler, B. A. Gilson, G. Hernandez, A. J. Johnson, M. D. Keister, J. W. McMillan, M. A. Noderer, E. J. Tullos, and K. E. White, Multispectral
Imagery Reference Guide (Fairfax, VA: Logicon Geodynamics, Inc., 1997), 2–8.
27. Belokon et al., 2–5, 6.
28. Associated Press, “Swiss Police Spy Marijuana Field with Google Earth” (January Associated Press, “Swiss Police Spy Marijuana Field with Google Earth” (January 29, 2009), accessed
23 September 2012 at http://www.highbeam.com/doc/1A1-D960T7180.html.
29. Lewis Page, “New Prototype US Spy Satellite Rushed into Active Use,” Space, (June 11, 2010), accessed 23 September 2012 at
http://www.theregister.co.uk/2010/06/11/artemis_goes_active/.
30. Ashton, Fianagan, and Olson, “Analyzing Hyperspectral Data.”
31. Ibid.
32. Centre for Integrated Petroleum Research, “Virtual Outcrop Geology” (2012), accessed 30 September 2012 at http://org.uib.no/cipr/Project/VOG/hyperspectral.htm.
11. Radar
Radar has entered our lives and become ubiquitous over the last six decades. We
encounter it in media weather reports and on the highway (in the form of speed
traps). Radar helps keep us safe when we fly, and in the future it appears that it
will help protect us when we drive. Originally developed for military purposes, it
now has many civil applications. And it is used continuously to provide
intelligence, which is the subject of this chapter and the next.
Chapter 7 categorized sensors as either active or passive. Chapter 9
examined passive imaging in the visible part of the spectrum, followed by
passive radiometric and spectral imaging in Chapter 10. We now begin to focus
on active sensing, which usually is done by radar. This chapter is about the many
applications of conventional radars (that is, those that do not use synthetic
aperture techniques). It also sets the stage for a discussion of synthetic aperture
radar (SAR) in Chapter 12.
In contrast to the passive sensors discussed in the two previous chapters,
radars produce their own illumination energy. This feature gives radars some
advantages in intelligence collection. For example, they operate day or night, not
needing the sun to reflect energy from a target. Radars that operate in the
microwave band can function in most weather conditions. Unlike optical
sensors, they are unaffected by clouds.
Function
The first radars were put into operation for air defense—that is, to provide
warning of approaching hostile aircraft. These were the Chain Home radars that
the British built in the late 1930s. During World War II they provided early
warning and subsequent tracking of German bombers as the aircraft crossed the
English Channel, giving the British fighters time to get in position to meet the
Germans.
The United States began building radars at about the same time as the
British, but their first radar use in combat was less than successful. An Army Air
Corps radar located at Opana Point, Hawaii, detected the approaching Japanese
attack force on December 7, 1941. But the attackers were mistakenly identified
as a scheduled flight of B-17s from the United States and no warning was given.
During the course of the war, shipborne and groundbased radar repeatedly gave
the Americans and British a combat edge against German, Italian, and Japanese
ships and aircraft. Airborne radars that could search the ocean’s surface later in
the war made life difficult for German submariners. Some authors have credited
radar as being the invention that won World War II because of all these
successes.
Radars today have a wide range of civil and military applications. Most
radars are used to locate a target and track its movement. Examples include
commercial air traffic radars, naval ship surface and air search radars, and air
defense radars. Surface-based radars are used to search the sky (or the surface, at
relatively short ranges) and track targets such as ships, aircraft, and satellites.
Most airborne and spaceborne radars are used to map the earth’s surface or to
detect and track ships and heavy ground vehicles such as tanks and missile
launchers. Airborne radars also search the sky for weather or other aircraft.
Radars can be placed on almost any platform. They range in size from the
towering over-the-horizon (OTH) radars discussed in this chapter to small
devices that can be carried in a backpack or mounted on an automobile.
In short, radar is used for a number of purposes, most of which have
nothing to do with intelligence. If radar data are used for immediate operational
purposes and quickly discarded, then it is considered operational information,
not intelligence. Air traffic control radars and ship and aircraft navigational
radars fall into the operations category; the information they collect has little
value later.
Sometimes, though, radar information is collected and retained for its value
beyond the moment. It may be useful for scientific research. It may be
intelligence. It may be provided by a radar that normally supports operations—
an air or missile defense radar, for example. Most radar intelligence is in fact
provided by radars that also have operational missions. For example, the test
flights of new aircraft and unmanned aerial vehicle (UAV) designs sometimes
are monitored by air defense radars and the results used by scientific and
technical (S&T) intelligence centers in systems evaluation.
Very few radars have only an intelligence function. OTH radars have been
deployed to monitor air traffic and ballistic missile launches in denied areas for
intelligence. The Cobra Dane and Cobra Judy radars described in this chapter
monitor the reentry stage of ballistic missile testing—though even those two
radars also have operational missions. (The term Cobra occurs on occasion as
part of the name of a U.S. intelligence collector. It does not refer to a snake; it’s
an acronym meaning “Collection By Remote Assets.”)
Clearly, the distinction between operational military use and intelligence
use can be difficult to draw, and the two uses often overlap. For example, radar
tracks of a hostile aircraft or ship usually have little value after the mission is
over, as noted earlier. However, if the aircraft or ship is a new version, not
previously seen, then the radar tracking data are likely to contain valuable
intelligence information about the performance of the ship or aircraft, and the
intensity of the radar return might tell something about the use of antiradar
(stealth) technology. The following are some general rules of thumb concerning
radar use:
• Searching for and tracking aircraft or ships is mostly operations but can
also be intelligence.
• Searching for and tracking ballistic missile reentry vehicles (R/Vs) that
are being used in conflict is operations, but the same tracking of R/Vs that
another country is testing is intelligence.
• Searching for and tracking another country’s satellites is operations
when the information is used to avoid satellite collisions or to target the satellite
for attack. The same information, when used to determine the satellite’s mission,
is intelligence.
• Imaging the earth’s surface can be scientific research, operations, or
intelligence, depending on how the data are used.
As an example of the last rule of thumb, the Joint Surveillance and Target
Attack Radar System (JSTARS) aircraft carries an imaging radar that provides
details about targets moving in the scene. The movement information could be
used for targeting moving vehicles such as tanks and trucks in combat situations
and so would be considered operations. However, information about such
movements could also be used to get a general picture of enemy intentions, and
so would have intelligence value. Clearly, there is overlap between the two: The
same radar can be used for both operations and intelligence collection
simultaneously.
Process
PLANNING
COLLECTION
Most intelligence collection using radar involves air surveillance, surface (land
and ocean) surveillance, space surveillance, and tracking and characterizing
reentry vehicles. Following an introductory section on radar operating bands and
how radar works, we’ll look at some radars that have been used to collect
intelligence in the various frequency bands.
How a Radar Works. At its most basic, a radar consists of a transmitter, antenna,
receiver, signal processor, and display. Most radars use the same antenna for
transmission and reception of signals.
The radar transmitter generates EM waves that radiate from an antenna that
illuminates the air or space with radio waves. Any target that enters this space,
such as an aircraft, scatters a small portion of this radio energy back to the
receiving antenna. This returned signal is amplified by an electronic amplifier,
processed, and displayed for a radar operator. Once detected, the object’s
position, distance (range), and bearing can be measured. As radio waves travel at
a known constant velocity (the speed of light—300,000 kilometers per second or
186,000 miles per second), the range may be found by measuring the time it
takes for a radio wave to travel from the transmitter to the object and back to the
receiver. For example, if the range were 186 miles, the time for the round trip
would be (2 × 186)/186,000 = two-thousandths of a second, or 2,000
microseconds. Most radars are pulsed, meaning that the radiation is not
continuous but is emitted as a succession of short bursts, each lasting a few
microseconds. An electronic timer measures the time delay between pulse
transmission and the returned signal and calculates the target range. Azimuth,
elevation, and range to the target determine the target’s position. The radar
thereby provides the precise location of the target and, based on target movement
between pulses, predicts the future position of the target.
Modern radar receivers digitize the returned signal, transforming it into a
series of bits that can be processed in several different ways to extract
information about the target signature. These digital receivers allow the detection
of weak target returns and the determination of target position, movement, and
configuration. The receivers allow the radar to operate in different modes;
depending on the nature of information desired about the target, the radar can
change its pulse shape and modulation, transmitting the pulses in different
directions and at different pulse repetition rates. The digital receiver processes
all the received data and automatically extracts the desired information.
Radars also identify moving targets and measure their velocity by observing
the Doppler shift in frequency when RF energy is reflected from a moving target.
The Doppler shift is an important part of the target signature. It is used in many
ways in technical collection and is essential to the functioning of imaging radar,
to be explained in Chapter 12.
To meet the demands of precisely tracking targets and searching for
additional targets, radar antennas have evolved into new configurations. Most
older radars continue to use some variant of the familiar parabolic antenna,
which shapes the RF energy into a beam. However, the parabolic antenna must
be mechanically moved to detect or track a target, and it can track only one
target at a time.
New radars increasingly use phased array antennas instead of parabolic
antennas. Rather than move the antenna mechanically, the phased array steers
radar energy electronically. In a phased array, there are many thousands of small
antenna elements placed on a flat structure. If the signals from the separate
elements all occur at the same time and in phase, they form a radar beam where
the beam direction is perpendicular to the array face. To detect objects that do
not lie directly in front of the array face, devices that shift the phase of the signal
reaching the antenna elements are used. These phase shifters change the
direction in which RF energy leaves or enters the antenna and thereby control the
direction of the main beam.
Since phased array radars have several thousand antenna elements, multiple
beams can be formed in rapid sequence or even at the same time. Thus, a phased
array radar is capable of simultaneously tracking several hundred targets; a
computer calculates the proper target measurements for each of these beams.
Phased array radars have advantages. They are inherently multifunction and they
can both search for and track many different objects at the same time. They were
slow to be adopted because they were considerably more expensive than
parabolic dish antennas to build and maintain, but the cost of building and
maintaining them has come down enough to make them the preferred design for
new radars.
For highly precise tracking of ballistic missiles and satellites,
interferometric radars are sometimes used. In an interferometer design, several
comparatively small antennas are deployed in the pattern of an L or X on the
ground; one or more of the antennas transmits a signal at the target, and the
return signal from the target is received by all the antennas. By comparing the
phase differences in the return signal among the antennas, the radar can
accurately determine the azimuth and elevation to the satellite or R/V and
provide accurate trajectory or orbital parameters.
Operating Modes. Most radars are optimized for one of the collection modes
discussed below. All of these modes are used to collect intelligence.
Search radars transmit a beam that is scanned across a volume of space to
detect targets. The beam blankets the volume with radar energy. Airport
surveillance radars and many air defense radars are of this type: the beam from
the radar is rotated so that it scans 360 degrees in azimuth to monitor air traffic
in the immediate area. Chapter 8 provided an illustration of the type. The
surveillance radar shown in Figure 8.11 is an example of a search radar designed
to monitor air activity over a battlefield.
Long-range search radars, such as those used in ballistic missile defense
(BMD) and space surveillance, usually require large phased array antennas and
high power, and they tend to operate in the lower radar frequency bands (VHF
and lower UHF bands). The U.S. PAVE PAWS radar; the FPS-85 radar at Eglin
AFB, Florida, that is described in this chapter; and the Russian Dnepr and
Dar’yal radars are examples of search radars. One of their missions is to detect
previously unknown targets so that the targets can be tracked and identified.
Tracking radars keep the beam on a target (usually a target detected by a
search radar) to follow or track the target throughout the radar’s volume of
coverage. Tracking radars are used to establish where a target is and where it is
going. When tracking a satellite, this is known as establishing the satellite’s
orbital elements. Tracking radars can use either phased array or dish antennas
and usually operate at higher microwave frequencies. Phased arrays are useful
for both search and track. One of their advantages, noted earlier, is that they can
simultaneously track many targets—a particularly important advantage in space
surveillance. For all antenna types, the accuracy of tracking is limited by the
antenna beamwidth; narrow beamwidths are better.
Object identification radars obtain a unique signature from a target such as
a satellite, aircraft, ship, or vehicle. That signature is used to identify the target’s
mission or purpose. Such use of radar to identify and characterize objects is part
of a subfield of measurements and signatures intelligence (MASINT) called
radar intelligence (RADINT). RADINT targets include satellites, missiles, ships,
aircraft, and battlefield vehicles.
An object identification radar can do many things, depending on its design.
It can image the target, determine its radar cross-section, identify and
discriminate among targets, precisely measure components, determine the
motion of the target or its components, and measure the target’s radar reflectance
and absorption characteristics. Radar returns can be used, for example, to
reconstruct the trajectories of missiles and convey the details and configuration
of the missile reentry vehicle itself.1
• radar imaging.
Imaging radars create a picture of the target. Some aircraft radars create an
electronic map of the earth’s surface that is used for navigation. Some imaging
radars are specifically designed to create high-resolution images of the earth’s
surface or of specific objects. Earth imaging radars, known as synthetic aperture
radars (SARs), are discussed in detail in Chapter 12. This chapter examines
some radars that are used to create images of objects.
Multifunction radars can function in two or more of the modes discussed
above. Fighter aircraft radars, for example, are multifunction radars; they can
track an aircraft while simultaneously searching for other aircraft in the area. The
Cobra Dane radar is another example of a multifunction radar. It can search for
targets, track them, and obtain target measurements by changing its mode of
operation.
Vibrometry is a radar technique that finds frequent intelligence use. It
depends on remotely sensing vibrations from a target. A coherent radar (one that
maintains a constant phase) illuminates the target area; the radar receiver extracts
the Doppler shift backscattered from the target to obtain a signature.
Microwave vibrometers have been used to collect communications
intelligence (COMINT) for decades. The concept is to transmit a strong coherent
EM signal at a nearby target (on the order of a few hundred meters away). The
target then reradiates the signal, modulated by the slight vibrations (usually
acoustic vibrations) that it experiences. The reradiated signal is then recovered
by a receiver antenna and demodulated to recover the acoustic signal. This
technique was introduced in Chapter 4 and described as RF flooding there. It has
been used to recover audio, as it did in the story of the U.S. ambassador’s great
seal. Chapter 4 also described how lasers use the same technique to exploit audio
vibrations from windows or similar fixtures within a building for COMINT
purposes.
Vibrometry can also be used to obtain nonliteral information about a target,
the target area, or activity in the area. Vibrometry is used for target identification,
for example; it can identify the unique signature created by RF signals reflected
from moving parts of a target. It can sense vibrations from the surface of a
building or the ground above an underground facility to identify processes going
on in the facility or machines that are operating in the facility. The acoustic
signatures generated by machinery often uniquely identify the machine, and both
the machine identity and its pattern of operation over time can provide valuable
intelligence insights. Lasers can be used for many of the same purposes—for
example, to detect machine noise or a helicopter blade’s rotation rate. Laser
radar vibrometry was used to identify a helicopter at 5-kilometer range in the
1980s. 2
bounce signals off the ionosphere to see around the earth’s curvature, making it
possible to conduct radar surveillance of otherwise inaccessible regions at ranges
of 1,000 kilometers or more. They can monitor both aircraft and ship
movements. But such radars are expensive to build and tricky to operate. They
depend on the ionosphere, which is a continuously changing reflector. The
operating band is very noisy; the band has many interfering signals, and a high
frequency radar has no reserved frequencies (as Table 11.1 indicates). The radar
gets intense clutter from the backscattered ground return, from which the desired
signal has to be separated. These problems require the design of a radar with a
very large antenna, very high power, and sophisticated signal processing. Two
such radars that the United States has used for intelligence are Cobra Mist and
the Air Force’s FPS-118 (OTH-B).
The FPS-95 OTH radar, codenamed Cobra Mist, was built on the English
North Sea Coast in the late 1960s to monitor air and missile activity in Eastern
Europe and the western areas of the Soviet Union. Cobra Mist was expected to
detect and track aircraft in flight over the western part of the Soviet Union and
the Warsaw Pact countries and monitor missile launches from the Soviet Union’s
Northern Fleet Missile Test Center at Plesetsk. The radar operated in the
frequency range from 6 to 40 MHz.
Cobra Mist was one of the largest, most powerful, and most sophisticated
OTH radars of its time, and the OTH radar community expected it to set new
standards for performance and capability. It was designed to detect and track
aircraft movements and missile launches at ranges of 500 to 2,000 nautical
miles, corresponding to one bounce off the ionosphere. A searchlight mode was
provided for high-priority targets whose approximate locations were known a
priori. These targets could include single aircraft, compact formations of aircraft,
or missile launches.
The key to this radar’s performance, as with any OTH radar, was to
separate target returns from the strong ground clutter. However, the detection
4
performance of the radar was spoiled from the beginning by noise that appeared
at all ranges where ground clutter was present. The sophisticated signal
processors were unable to separate targets from what became known as “clutter-
related noise.”
Experiments performed at the site failed to uncover the source of the noise.
The noise appeared to be associated with imaging of land areas and not of sea
surfaces. The possibility of electronic countermeasures was considered and not
ruled out. After many attempts to locate the source of the noise and correct the
problem, the radar program was terminated in June 1973 and the equipment
removed from the site or allowed to deteriorate. The cause of the noise is still
unknown. 5
Most radars operate at frequencies higher than HF and, because they cannot
see targets below the horizon, are called line-of-sight radars. Following is a
discussion of the main line-of-sight radar operating bands, with some examples
of radars used for intelligence that operate in the VHF and higher-frequency
bands. This is an illustrative list of such radars and does not include all radars
used for intelligence collection.
VHF. Radars operating in the two standard VHF bands (138 to 144 and 216 to
225 MHz) are usually designed for long-range search. Formerly these bands
were used for airspace search, but now the most common application of VHF
radars—at least in intelligence—is for ballistic missile and satellite detection and
tracking. These ground-based radars typically use large antennas (though smaller
than those used in the HF band). A major disadvantage is that, like the HF band,
the VHF band is quite crowded with other signals and generally very noisy.
The French Graves is an example of a VHF radar used in intelligence. It
was specifically designed for space surveillance. It has a novel design: a bistatic
radar, meaning that the transmitter and receiver are spatially separated. The
Graves transmitter is located near the Dijon Air Base in eastern France. The
receiver is located on the Albion Plateau in southern France, some 400
kilometers away. The transmitter electronically scans a volume of space
continuously using a VHF signal. The receiver scans the same volume of space,
detecting satellites and estimating the satellite velocity and direction from the
Doppler shifted return. The radar reportedly can detect objects in orbit at an
altitude of between 400 and 1,000 km.
The Graves radar became operational in November 2005. Since then, it has
been keeping a database of some 2,000 satellites up to date. According to the
French, Graves has tracked a few dozen sensitive satellites for which the United
States does not publish orbital elements. The French have threatened to publish
the orbital elements about the U.S. satellites as a negotiating tool; they object to
the U.S. practice of including orbital data on sensitive French satellites in the
U.S. space catalog.8
UHF. The UHF radar bands (420 to 450 and 890 to 942 MHz) are used to
operate radars similar in design and purpose to those in the VHF band. The UHF
band, though, encounters less noise and interference. The UHF band is defined
as extending from 300 to 3,000 MHz, which technically includes the radar L and
S bands that are discussed below. However, by convention the term UHF radar
only is used to denote a radar operating in the 420 to 450 and 890 to 942 MHz
bands.
The radar has a database of more than 7,000 satellites and space debris, and
it tracks these objects as they enter the radar’s coverage area. It makes about
20,000 observations each day and relays the time, elevation, azimuth, range, and
range rate data on each object to the North American Aerospace Defense
Command (NORAD) facility at Cheyenne Mountain, Colorado. It can observe
deep-space objects out to the range of geosynchronous orbiting satellites—up to
37,500 kilometers—and can track 200 near-earth targets simultaneously.
Note that the FPS-85 has two antennas, one for transmitting and one for
receiving. This does not make it a bistatic radar like the Graves radar discussed
previously. A bistatic radar has its antennas separated by a distance comparable
to the distance from the radar to its targets, usually on the order of several
hundred kilometers. The use of two antennas in the FPS-85 simplifies the RF
hardware design and allows the radar to both search and track more efficiently.
L Band. The 1215 to 1400 MHz band is heavily used worldwide for air
surveillance, and intelligence uses include tracking aircraft of interest (e.g., those
carrying illicit cargo). It also finds intelligence uses for ballistic missile and
satellite detection and tracking. It is a good compromise band: high enough in
frequency to avoid the noise and interference effects of lower frequencies but
low enough that high-power search radars can be built at a reasonable cost.
The Cobra Dane radar is an example of such an intelligence collection
sensor. It was built in 1977 on the island of Shemya, Alaska. The radar’s primary
mission is to track and collect signature data on foreign intercontinental ballistic
missiles (ICBMs) and submarine-launched ballistic missiles (SLBMs). That
signature data supports treaty monitoring and technical assessments of foreign
ICBM performance. Cobra Dane also has an operational mission; it provides
early warning for missiles that would impact the continental United States. 11
Cobra Dane can also detect, track, and catalog satellites and obtain
signature data on them. But it has limitations in handling that mission because of
the trade-off problem discussed in Chapter 7. The radar was built to acquire,
accurately track, and obtain detailed signature data on ballistic missile reentry
vehicles impacting on Russia’s Kamchatka peninsula and the North Pacific. That
requirement led to designing radar with a fixed orientation (that is, a fixed
boresight) toward Kamchatka. As a result, its spatial coverage is less satisfactory
for satellite tracking. Its location and orientation prevent it from seeing satellites
in some orbits. Only satellites with inclinations between 55 and 125 degrees can
be tracked. The FPS-85, in contrast, is well positioned to obtain orbital
13
S Band. The two S bands (2.3 to 2.5 and 2.7 to 3.7 GHz) are used for both air
and naval search radars and target-tracking radars. These radars tend to have
smaller antennas than L band radars, so they are often mobile. Both mobile
ground-based and shipboard radars make use of the band.
An example of such a radar used primarily for intelligence is the Cobra
Judy radar. The two Cobra Judy radars (S and X bands) are mounted on a ship,
the USNS Observation Island. The ship’s primary mission is to collect detailed
radar signature data on strategic ballistic missiles to verify compliance with
international arms control treaties. A secondary mission is to collect data for
U.S. missile development and theater missile defense systems testing. It
monitors and collects data on foreign ballistic missile tests, complementing the
Cobra Dane radar. 14
The Observation Island is one of the oldest active ships in the U.S. Navy; it
originally was a merchant ship when launched in 1953. It is to be replaced in
2014 by the USNS Howard O. Lorenzen, shown in Figure 11.4. The new ship
carries the Cobra King radar, which transmits in both the S and X bands (making
it what we call a dual-band radar). The S band Cobra King radar will use a
phased array antenna mounted on a rotating turret so that it can search for,
detect, and track multiple targets simultaneously. Cobra Judy will be allowed to
16
retire, and Cobra King will presumably pick up and carry on the same missions.
C Band. Radars in the 5.25 to 5.925 MHz band typically are designed to provide
very precise tracking. Radars in this band also are commonly used for fire
control (that is, to target ships or aircraft for attack).
ALCOR, a satellite and ballistic missile tracking radar, is one of three space
surveillance radars located at Kwajalein Island in the South Pacific. The other
two radars are the ARPA Long-range Tracking and Identification Radar
(ALTAIR) and the Target Resolution and Discrimination Experiment
(TRADEX). ALCOR is a high-power, narrow-beam tracking radar. It uses a
narrowband (6-MHz bandwidth) pulse for tracking targets and a wideband (512-
MHz bandwidth) pulse for obtaining images of targets. The wideband waveform
provides a range resolution of approximately 0.5 meters. These high-resolution
data, coupled with advanced radar signal processing, allow it to generate satellite
images. The images are used to identify and characterize space objects and to
assess spacecraft health and mission status.17
X Band. The 8.5 to 10.68 GHz band, like the C band, has traditionally been used
for precision tracking radars. It was not considered a good band for long-range
searches because the typical radar antenna in this band has been rather small (on
the order of 1 meter to a few meters in size), and getting the high power needed
for long-range search was not easy.
Newer radars have overcome this obstacle. And some new radar designs in
this band can do it all: search, track, and get detailed signature data. An example
is the sea-based X band radar shown in Figure 11.5. It is a floating, self-
propelled, mobile radar station designed to operate in high winds and heavy seas.
It is part of the U.S. government’s ballistic missile defense system. The radar can
detect and track ballistic missiles and satellites at long ranges. Its operation at X
band, around 10 GHz, allows it to transmit a wide bandwidth signal, obtain high
resolution of tracked objects, and consequently obtain very detailed signatures.
The signatures enable the radar to discriminate an R/V from decoys, the rocket
body, and debris.18
Laser Radars. Laser radars operate much like microwave radars. The radar
transmits pulses of laser light and detects energy reflected from the target. As
with all radars, the time required for the energy to reach the target and return to
the sensor determines the distance between the two. Unlike RF band radars, laser
radars cannot penetrate clouds. But the laser radar has two big advantages:
• its beam is very narrow, so that it can illuminate an extremely small surface
(on the order of 1 centimeter diameter at short ranges, less than 1 meter at
aircraft-to-ground distances); and
• it can transmit very short pulses and measure distance to a high degree of
precision.
The narrow beam and short pulses allow laser radars to produce
threedimensional images. And they are able to do so without using the SAR
techniques discussed in Chapter 12. They can measure the dimensions of
features (such as forest canopy or building height relative to the ground surface).
One of laser radar’s most important intelligence uses is for defeating
camouflage or forest canopy. The laser takes many measurements of the same
target area so that it in effect finds holes in the covering material. It therefore is
able to penetrate through the camouflage mesh to obtain a return from the object
inside. Using this technique, laser radars have demonstrated a capability to
provide three-dimensional (3-D) imagery of military vehicles concealed under
foliage or camouflage. The images are of sufficient quality for analysts to
perform object classification and identification. Figure 11.6 illustrates an
19
example of the visible image of a tank concealed by camouflage netting (on the
left) and a laser image of the same tank (on the right). 20
Finally, laser radar is useful for tracking space objects, because it does not
depend on having the proper lighting conditions and target geometry that is
described in Chapter 9. Figure 11.7 shows an example of such a radar; the
Russian Sazhen-M has two telescopes. One is the laser transmitter; the other
receives the return signal.
Processing and exploitation of radar data for intelligence purposes usually are
intended to provide the location of a target of interest over time, that is, tracking.
This tracking information provides a type of pattern.
FIGURE 11.7 The Sazhen-M Laser Radar 22
• For aircraft, the pattern is geospatial; the aircraft’s location and flight
track can tell something about its mission, for example, hostile intent or illicit
arms or narcotics traffic. Speed and altitude of the aircraft also can help to
identify its mission.
• For ballistic missiles, the pattern is the reentry vehicle’s trajectory. The
trajectory allows the radar to identify the R/V target. Also, the radar can identify
R/V maneuvers during reentry (such maneuvers usually are designed to avoid
antimissile defenses or to improve warhead accuracy).
• For satellites, the pattern is the satellite’s orbital parameters. The orbital
parameters help to determine the satellite’s mission. A historical record of an
object’s orbital behavior can be used to determine what is normal versus unusual
behavior. A satellite will sometimes maneuver in order to correct for drift or
drag, and these maneuvers provide additional intelligence about the satellite’s
mission and operational status.
Envisat satellite. Compare this with the optical image of Envisat that is shown in
Chapter 9 (Figure 9.6). As the figure suggests, radar imaging is not as easily
understood as optical imaging. The image requires interpretation and an
understanding of how satellites or aircraft are designed. The image was produced
by the TIRA radar on April 10, 2012. 25
DISSEMINATION
Structure
Most of the radars that support intelligence collection are owned and operated by
military or law enforcement units and are used primarily for operational
purposes. All U.S. military services operate radars that have a primary
operational function but sometimes serve intelligence purposes. Air, ocean, and
space surveillance radars all have on occasion seen such dual use.
Law enforcement units operate radars for air, ground, and ocean
surveillance—primarily for countering narcotics traffic and illegal immigration,
and in some regions, for dealing with gray arms traffic. These radars also
directly support operations and are controlled by operational units, but they also
provide intelligence as a second mission.
Summary
Radars have a wide range of civil and military applications. Most radars are used
to geolocate a target and track its movement. Airborne and spaceborne radars
also are used to map the earth’s surface, detecting and tracking targets of interest
on the surface; or in the case of airborne radars, to search the sky for weather or
for other aircraft. Radar, therefore, is used for a number of purposes, most of
which have nothing to do with intelligence. The general rule is that if the radar
data have enduring value beyond the immediate demands of the mission, it is
either intelligence or research data. If it has no such enduring value, it is usually
operational data.
Radars usually are optimized to perform one of four functions. Search
radars transmit a beam that is scanned across a volume of space to detect targets.
Tracking radars keep the beam on a target (usually a target detected by a search
radar) to follow or track the target throughout the radar’s volume of coverage.
Imaging radars create a picture of the target, but the images produced by
conventional RF band radars have poor resolution. Object identification radars
measure the physical characteristics of an airborne or spaceborne target in order
to obtain intelligence details about the target. Multifunction radars perform two
or more of these functions. Radars also can obtain unique target signatures that
have intelligence value—vibrometry signatures, for example. In vibrometry, a
coherent radar illuminates the target or target area; the Doppler shift
backscattered from the target provides a signature that has intelligence value.
Radars for space and missile surveillance are designed to perform one or
more of three functions: search for ballistic missiles, reentry vehicles, or space
objects (satellites or space debris); precisely track such objects; and identify
them. Each function requires a somewhat different radar design, although radars
can be built to perform all three functions by compromising functionality.
Phased array radars are commonly used because they can perform multiple
functions and track multiple targets simultaneously.
Most radars operate in designated blocks of frequency bands, and radars use
these operating bands for specific intelligence purposes:
• OTH radars operate in or near the HF band; they bounce signals off the
ionosphere to see around the earth’s curvature, making it possible to conduct
radar surveillance of otherwise inaccessible regions. They have the advantage of
monitoring targets that are moving at substantial distances inside a country or on
the ocean and providing almost continuous surveillance at ranges on the order of
thousands of kilometers.
• VHF and UHF radars are used for space surveillance.
• L band radars find wide use for monitoring air activity and are used also
to monitor ballistic missile testing.
• S and C band radars provide precise tracking of aircraft, missiles, and
satellites. In addition to a tracking role, C and X band radars also are used to
obtain imagery of these targets.
• Laser radars have the advantage of using a much narrower beam and
more precise range measurement capability than microwave radars. These
advantages allow laser radars to create 3-D images. They also allow laser radars
to do two things that are of intelligence interest: to see through forest canopy and
camouflage netting and to track satellites with high accuracy.
NOTES
Function
A SAR is one of the most complex remote sensors to build and operate. But it is
the most important one used in intelligence. SAR images have a number of
advantages when compared with optical imaging:
Optical imagers can provide maps, but because they do not measure range to the
target, they don’t do well at determining terrain elevation. SARs do measure
range, so they can provide precise topography of the target area. Furthermore,
SARs can characterize terrain, identifying soil and moisture conditions that
might affect military force movements. They do this by measuring the radar
backscatter from the target area; moist soil, sand, rocky areas, and bogs all have
different signatures that can be identified.
CHANGE DETECTION
One of the major advantages of SAR is its ability to detect changes in a scene
over time. Change detection is an application to which SAR is particularly well
suited. Examples of surface changes that can be observed include vehicle tracks,
crops growing or being harvested, and soil excavation. Changes in the terrain
surface due to underground construction also can be observed by change
detection. The underground excavation results in both vertical settlement and a
horizontal straining that is detectable.
1
SARs can penetrate numerous materials or surfaces that would normally hide
equipment or facilities (for example, canvas tents and most wooden sheds
become transparent to radar). An application of SAR that has obvious
intelligence uses is foliage penetration. Chapter 11 discussed the use of laser
radars to find holes in foliage and to image hidden targets. SARs can do the
same thing without the need to find holes, depending on the SAR operating
frequency. Most SARs operate in the higher microwave bands—C and X bands
—because target resolution improves as frequency increases. But radars in these
frequency bands do not penetrate foliage well, and their penetration capabilities
get worse as frequency increases. However, SARS can also be built to operate in
the UHF, or even in the VHF bands. At these lower frequencies SARs can
effectively image objects concealed in dense foliage, even objects located
underneath the forest canopy. They also penetrate into dry earth for short
2
Process
PLANNING
Because a SAR uses substantial power when transmitting, and because such
power is limited onboard a satellite, spaceborne SARs don’t operate
continuously. Collection usually must be planned in advance to look at specific
targets or target regions of interest, with an eye to conserving power. Airborne
(including unmanned aerial vehicle, or UAV) SARs aren’t so severely power-
limited and are more likely to be operated continuously.
Tasking of spaceborne SARs also is constrained because the orbit is more
or less fixed. Imaging of specific targets has to be timed so that the targets are in
the proper geometry (off to the side of the satellite and located somewhere
between the maximum and minimum range). Airborne SARs have more
flexibility; they can select a flight pattern that puts targets within the proper
geometry.
FIGURE 12.1 Airborne SAR Image of the Pentagon
Planning also must take into account the compromise between area
coverage and resolution, discussed in Chapter 7. Strip map mode provides better
coverage. Spot imaging mode provides better resolution. In addition, for many
SARs it is necessary to choose between an MTI mode of operation and an
imaging mode.
COLLECTION
edges, are very strong radar reflectors and show up as bright returns.
Obtaining Range Resolution. Solving the first problem was relatively easy. For
conventional radars, range resolution depends on the duration of the transmitted
pulse (called pulse width). A one-nanosecond pulse (onebillionth of a second)
has a range resolution of approximately one foot, which provides very good
range resolution. But a one-nanosecond pulse has very little energy in it, so the
backscattered signal from most targets will be difficult for the radar receiver to
detect. A longer pulse, say, one microsecond, would provide 1,000 times as
much energy, which gives a more detectable backscattered signal. But a one-
microsecond pulse has a range resolution of about 1,000 feet, which is totally
unacceptable for intelligence applications. The challenge is to illuminate the
target with a one-microsecond (or longer) pulse but to obtain the range
resolution of a one-nanosecond pulse.
The solution was to create a pulse that has long duration but is electrically
short, using a technique called pulse compression. Most SARs do this using a
pulse that is frequency modulated (FM), called a chirped pulse: its frequency
smoothly changes over the duration of the pulse, as shown in Figure 12.2. A
pulse like the one shown contains many frequencies and, thus, has a wide
frequency bandwidth. Consequently, it can be processed to give the range
resolution of a much shorter pulse having the same bandwidth. The result is that
you get the energy of a long pulse combined with the resolution of a short pulse.
Using this technique, many radars (both conventional and SAR) have
demonstrated 1.8-GHz transmit bandwidths (corresponding to a range resolution
of 0.1 meter) while having ample energy to detect small targets.
FIGURE 12.2 Frequency Change in a Chirped Pulse
Forming the SAR Image. Synthetic aperture radar imaging is a two-step process
of data acquisition and coherent processing of a series of radar range echoes to
recover a fine resolution image of a scene. A SAR works by transmitting a series
of coherent pulses at a target area; coherent means that the pulses all have the
same phase, as though they had been transmitted as a continuous sine wave that
is shut on and off to generate pulses. Figure 12.3 illustrates how the coherent
pulse train is transmitted in a succession of pulses at equal time intervals (t , t ,…
1 2
, t ) as the aircraft or satellite moves. For a SAR to work, it is essential that all
n
the pulses that will be used to form an image be transmitted coherently and that
the radar retain a memory of the exact frequency and phase of the transmitted
signal.
you; the radar would measure a higher frequency return than it transmitted
(positive Doppler shift). At time t , you would see the target area moving more
2
slowly toward you than before, and the radar would measure a decreasing
Doppler shift. Later, the Doppler shift would go to zero as you passed the target
area. Then as you reached time t in the figure, the target area would appear to be
n
Spotlight and Strip Map Imaging. SARs can operate either as spotlight or as
strip map imagers. Either mode can be used, depending on the trade-off that is
made between the level of resolution needed and the desired area of coverage.
In spotlight mode, the entire spacecraft is rotated into the direction of the
target to increase the integration time and, therefore, the in-track resolution. To
get the best resolution, a SAR is operated in spotlight mode, where data are
collected from a single patch of terrain. As the SAR platform moves past the
scene, the radar beam is continuously adjusted so that it always points to the
same area of the ground. The SAR image resolution improves (that is, the
distance between distinct pixels becomes smaller) as the total collection time on
the patch of ground increases. Thus, the longer the collection time, the better the
resolution because the movement of the spacecraft in effect creates a longer
antenna.
The image in Figure 12.3 shows an example of spotlight imaging geometry.
During the SAR platform movement, the antenna is steered so as to continually
illuminate the same ground patch. High azimuth resolution is achieved by using
an antenna of modest size and coherently processing a series of range echoes
obtained as the radar moves past the scene. The coherent processing combines
the information from the series of range echoes to, in effect, create a synthetic
array that is as long as the flight path while the SAR is spotlighting the ground
patch.
FIGURE 12.4 Spotlight versus Strip Map Imaging
For strip map imaging, the antenna points in a fixed direction (normally
perpendicular to the direction of aircraft or satellite movement, as shown in
Figure 12.4). In this case, the effective length of the synthetic aperture is much
less than in the spotlight example. It turns out to be the same as the width of the
area illuminated on the ground at any instant—the diameter of one circle in
Figure 12.4. This aperture still provides good azimuth resolution, but it is
considerably worse than the resolution provided in spotlight mode.
The advantage of strip map imaging, as the figure indicates, is that it covers
a much larger area. One gives up resolution to get area coverage. As with any
remote sensor, the goal is to get large area coverage with high resolution, but
improving one of these generally makes the other worse.
An illustration of the trade-off between spotlight and strip map mode is the
German radar satellite TerraSAR-X, described later. It can obtain 1-meter
resolution in spotlight mode, but it is limited to covering an area of 5 kilometers
by 10 kilometers. In strip map mode, the area of coverage grows to 30
kilometers by 50 kilometers, but resolution drops to 3 meters. 8
• For target identification, a spot mode can provide 0.3-meter resolution over
10 square kilometers—a useful capability for ocean surveillance. 11
radar had the ability to obtain very high resolution images of ships at sea,
sufficient for identifying specific ships. Germany’s TerraSAR-X and Israel’s
13
• Aircraft can get the SAR closer to a target and generally can transmit
more power than spaceborne radars. Airborne SARs can therefore detect smaller
targets, enabling them to generate more detailed (finer grain) imagery.
• Spaceborne radars have a better imaging geometry because they operate
at much higher altitudes than airborne radars. At altitudes of several hundred
kilometers, spaceborne radars can image the same swath widths as airborne
radars but over a much narrower range of incidence angles, typically ranging
from 5 to 15 degrees, as illustrated in Figure 12.5. This geometry provides for
more uniform illumination and makes imagery interpretation easier. Artifacts
such as layover and shadowing, discussed later, are less of a problem with
spaceborne SAR imagery.
satellites was launched in December 2006, and the fifth was launched in June
2008. The five satellites operate in three 500-kilometer orbits in planes roughly
60 degrees apart. The radar operates in X band at a center frequency of 9.65
GHz. The SAR-Lupe’s average power consumption is about 250 watts, and its
expected life is 10 years.
The SAR-Lupe has performance characteristics that make it an excellent
intelligence collection sensor. Its three-meter-diameter dish antenna, the back of
which is shown in the figure, reportedly provides a resolution of about 0.5 meter
over a frame size of 5.5 km on a side in the spotlight mode where, as previously
noted, the satellite rotates to keep the dish pointed at a single target. Resolution
is about 1 meter over a frame size of 8 kilometers by 60 kilometers in the strip
map mode, where the satellite maintains a fixed orientation over the earth and
the radar image is formed simply by the satellite’s motion along its orbit. The
radar is able to image a given area of earth once every 10 hours or less.
15
Phase history data are collected and processed to form a complex image, which
is then further processed to form a detected image.
The task of the image processor is to combine all of the returns received
from a given area to produce a focused image. The SAR processing algorithms
are very sophisticated because they must account for a steadily changing scene
as the radar moves; individual targets scatter energy differently at different
aspect angles between the target and radar.
SAR data are collected by rapid pulsing over a period of several seconds.
During this period the angle between the SAR antenna and the ground is
changing. The initial processing of phase history data is done using the
assumption that the intensity of return from each point in the scene is the same
for each pulse. The following processing assumptions are made:
• Flat terrain
• Stationary targets
The Nonflat Terrain. The assumption of flat terrain is violated most of the time.
Very few land areas are completely flat. Mountains and vertical structures create
two artifacts in a SAR image: shadowing and layover. More complex structures
can create apparent targets downrange from the complex structure, as discussed
below.
Shadowing is fairly easy to understand because it is much like the shadows
created by the sun. Shadowing occurs in the downrange direction from targets
elevated above the surrounding terrain, such as mountains and buildings. The
shadowed region appears as a black area in the SAR image because no signal
was returned from that region of the scene. Figure 12.7 illustrates how
shadowing works; the area behind the building is in shadow, and objects located
in that area cannot be observed.
FIGURE 12.7 Layover and Shadowing in SAR Imagery
Elevated targets also produce layover toward the SAR flight track, also
illustrated in Figure 12.7. Layover occurs because a SAR puts all scene points
that are at the same range into the same range cell in the image. In Figure 12.7,
the radar pulse hits the building top first, because it is closer to the radar.
Because of the flat earth assumption, when the imagery is processed, the return
from the top of the building is placed closer to the radar, while the return from
the bottom of the building is placed at its correct flat earth position. Tall
structures thus appear to lay over on top of the ground on the near-range side of
the target.
Both the shadowing and layover effects show up in the SAR image of the
Pentagon in Figure 12.1. The airborne SAR was located south of the building,
looking north; the shadowing effect is clearly displayed on the northeast and
north sides, and a layover effect can be seen in a bright line offset from the
building parallel to the southwest side.
The extent of layover depends on grazing angle and the height of the
elevated target. In Figure 12.7, if the SAR were at a lower elevation angle (lower
grazing angle), then the difference in time between the pulse hitting the top of
the building and the bottom would be less, and the layover would be smaller.
Image interpretation is complicated in layover regions due to the overlap of
the elevated structure with features on the near-range side of the structure.
Layover will also cause a distortion of any topographic variations in the scene.
Multibounce creates the opposite effect from layover. When a SAR looks at
an urban area or a complex structure or cavity, the backscattered signal does not
necessarily return directly to the radar. Multibounce signatures can appear in
SAR imagery for complex targets where the microwaves reflect off more than
one point before returning to the sensor.
Because the multibounce path is longer than the normal single bounce
backscatter, the SAR distorts the target shape and places the target multibounce
signature downrange from the actual target location. For complex targets, there
can be several multibounce signatures corresponding to different paths.
Nonstationary Targets. The processing of SAR phase history data assumes that
all targets in the scene are stationary for the entire time that the radar illuminates
the scene. When this is not the case, such as for moving targets, an artifact is
produced in the SAR image. As the target moves across the scene, it creates an
artifact due to improper focusing. The phenomenon is much the same as when a
camera with slow shutter speed takes a picture of a fast-moving object. The
object will be blurred in the picture because, while the shutter is open, the object
occupies several different locations in the image frame. It is the same with a
SAR and a moving target: While the SAR is transmitting its pulses to form an
image, the target is moving through several pixels in the image frame.
The artifact resulting from target movement depends on the nature of the
movement; some of the most common are target displacement, smearing, and
target distortions. Which artifact occurs is determined by the geometry between
the SAR platform and the target and the motion of the two with respect to each
other. Following is a description of two common artifacts due to target
movement.
Target displacement is the result of target movement toward or away from
the SAR. As Figure 12.9 shows, if the target (in the figure, a tank) is moving
toward the SAR platform, then the target image is shifted in the direction of the
SAR platform movement. If the target is moving away from the SAR, the shift is
in the opposite direction.
Smearing results from changes in target velocity. Suppose the targets in
Figure 12.9 were not moving at a constant velocity but instead were accelerating
or decelerating toward or away from the SAR. This acceleration or deceleration
causes a constantly changing displacement when the image is formed. Instead of
a simple displaced image as shown in the figure, the result is a smeared image of
the target parallel to the direction of SAR movement (called the azimuth
direction). The changing target speed causes the shift to vary during the
collection interval. This variation generates the azimuth smear. The shape of the
smear depends on grazing angle and squint, as well as the target motion.
FIGURE 12.9 Target Movement Artifacts in SAR Imagery
Azimuth motion also causes smearing in the azimuth direction. If the target
is moving at a constant velocity in the azimuth direction, the smear will be
linear. In contrast, if the target is accelerating or decelerating, the smear will
have a curved shape.
Smearing is often exploited to infer information about the motion of a
target; however, in many cases the smearing can obscure or distract from targets
of interest. A processing technique called smear reduction is used to clean up the
SAR image by removing smearing.
Another form of smearing is caused by objects that stay in a fixed position
but that rotate or vibrate. They cause a distorted return that appears in the SAR
image as a spatially repeating (periodic) signature. These signatures are often too
faint to be seen in SAR data. However, for systems with large vibrating or
rotating metallic parts the signal can be exploited. Rotating helicopter blades or
large fan blades associated with cooling towers usually appear in a SAR image
as a distorted target. The distortion usually shows up as pairs of echoes that are
displaced azimuthally on either side of the target, the distance from the target
indicating the speed of rotation or vibration. A vibrating earth or vibrating
building will produce a similar distortion, but the returned signal generally will
be too weak to show up in the SAR image. 17
Nonconstant RCS. Processing also makes the assumption that RCS remains
constant while the image is being created. A perfectly round sphere has a
constant RCS, no matter from what direction it is illuminated. Nothing else does.
Few, if any, spheres are present in a typical SAR scene; most of the objects in the
scene will have a changing RCS as the SAR-to-target geometry changes. The
resulting bright spots in the SAR image (where the RCS of objects becomes
suddenly very large) are called glint. For example, edges that are perpendicular
to the SAR beam will return a higher signal leading to bright image pixels, or
glint. Some curved surfaces can create bright streaks along the curved edge. This
effect is especially noticeable from power lines or telephone wires.
Flat surfaces can vary greatly in RCS. A common example is a flat metallic
rooftop that becomes very bright when the SAR beam is perpendicular to it at
some point in the collection period. If this is strong enough it can lead to receiver
saturation. The target seems expanded on the image, a phenomenon called image
blooming. As with smear reduction, glint reduction techniques are used to clean
up a SAR image by removing this artifact.
Synthetic aperture radars are highly flexible; they can collect or process
data in a number of ways that have intelligence value. The following sections
discuss a few of these.
Change Detection. The advantages of change detection were introduced earlier.
Three techniques are used for change detection: incoherent change detection,
coherent change detection, and SAR interferometry. The first two techniques
require repeat passes, separated in time by hours, days, weeks, or even years,
wherein the SAR looks at the same target area at approximately the same
azimuth and elevation. Figure 12.10 illustrates the repeat pass case. The third
technique, SAR interferometry, can be done in a single pass but requires two
separate receive antennas located on the same platform.
only that traffic has occurred in the area but that a certain type of traffic has
occurred. Germany’s TerraSAR-X and SAR-Lupe are two examples of
21
ocean currents.
The other approach is to use SAR interferometry for terrain mapping. One
way to do this is to have the satellite carry two receive antennas, located one
above the other. The difference here is that both antennas receive and process the
same backscattered pulse simultaneously. Because the two antennas view the
scene with slightly different imaging geometries, changes in terrain features can
be measured precisely.
dimensional (3-D) image of the earth’s surface, so that detailed terrain maps can
be created. The technique is similar to the use of stereoscopy in visible imaging.
The product, a digital 3-D image of the earth, is sold commercially but has
obvious intelligence uses. The pair can also do polarimetric imaging. 26
• Transmitting and receiving both polarizations (a SAR that does this is called
fully polarimetric)
SAR Imaging over Water. Over water, SAR sensors observe only the ocean’s
surface; unlike ground returns, there is almost no water penetration. A
completely smooth water surface or biological and man-made slicks (such as oil
slicks) return very little energy to the radar and appear to be black in the
resulting image. The sea surface, though, is seldom smooth, and backscatter
from a rough sea surface produces a return that can be measured and analyzed.
For example, though radar energy doesn’t significantly penetrate into seawater,
SAR measurements can indirectly provide information about water depth—often
a critical piece of intelligence for naval operations. Ocean waves display
different patterns in a SAR image as the waves move from deep to shallow
water.
Polarimetric SAR has some special advantages in SAR imaging over water.
The water surface returns very little horizontally polarized energy to the radar.
But objects in the water return both polarizations. As a result, the horizontally
polarized backscatter often will highlight small, pointlike targets such as mines
floating in the water.
Figure 12.13 illustrates the type of display that a JSTARS radar can
produce. It shows the lines of retreating Iraqi forces during the first Gulf War
30
(Desert Storm) on February 28, 1991—an image that has become known as “The
Mother of All Retreats,” in mimicry of Saddam Hussein’s boast that this would
be “The Mother of All Battles.”
The figure illustrates another important capability that MTI can offer for
intelligence. It allows the imagery analyst to extract road map information and to
assess traffic flows. Once roads have been mapped and normal traffic flows have
been established, the analyst is well positioned to identify priority targets and to
identify changes in traffic that have intelligence significance (for example, the
traffic increase that would presage a major military operation or, in this case, a
major retreat). In this figure, fleeing convoys of Iraqis can be readily seen on
three roads. 31
After the material has been processed and exploited, and after analysis has
extracted as much useful intelligence as possible, the imagery product has to be
disseminated.
DISSEMINATION
Visible imagery often is disseminated directly to end users who usually can
understand it unaided, though some features may require assistance from
imagery analysts. It is not so simple for radar imagery. It has to be annotated and
explained by a qualified imagery analyst. A number of the artifacts discussed in
this chapter—layover, shadowing, target displacement, and distortion, among
others—can mislead the image viewer.
Battlefield SAR images usually are disseminated at a relatively low
classification (no higher than Secret) and ideally can be shared with coalition
partners. Special SAR collection or exploitation techniques may require a higher
classification and more limited distribution to protect sources and methods.
As with optical imagery (visible and spectral), libraries are needed for
imagery interpretation. These libraries are more complex than the imagery
analysis keys used with visible imagery, because the signature of a given target
will be different depending on the radar operating frequency and the
combination of polarizations used.
Structure
The SAR imagery structure is shaped by the nature of the customer, the
collection platform, and whether the collection is clandestine or overt.
Like visible and spectral imaging, imagery to support national requirements
usually is centralized in an organization that provides imagery products for a
wide range of policymakers and military customers. Aircraft and UAV imagery
coverage may sometimes be done at the national level, but military forces are the
primary customers of this imagery. Military tactical imagery support typically is
organic; that is, it is handled by airborne reconnaissance platforms (aircraft and
UAVs) in the theater of operation.
While SAR imagery collection for intelligence usually is done by a national
level organization that also does visible imaging, the processing and exploitation
is completely different than that for visible imagery. So a separate
suborganization is likely to be used.
Overt collection is done by many governmental and commercial
organizations. Military, other governmental, and commercial organizations have
all made use of SAR imagery from NASA in the past. Airborne and satellite
imagery from sources such as TerraSAR-X is sold commercially.
Summary
A conventional radar can create an image as it scans the earth’s surface, as noted
in Chapter 11. Airborne search radars do this routinely, but the image has poor
resolution because the pixels are quite large and become larger with increasing
distance from the radar. Such is not the case with a SAR.
A SAR creates a high-resolution image of the target area based on the radio
frequency energy backscattered from a target area. A SAR image is a map of the
intensity of this energy that is backscattered from points in the scene. Brighter
image pixels correspond to points of higher backscatter return.
A SAR differs from a conventional radar in that it synthesizes a long
antenna using a sequence of pulses. Longer antennas produce better resolution
images in the azimuth direction. To form what is effectively a long antenna, the
radar transmits pulses coherently and retains a memory of the exact frequency
and phase of the transmitted signal. When a backscattered signal returns, the
radar measures the intensity of the return and compares the backscattered signal
frequency with that of the transmitted signal. Slight differences in frequency, or
phase differences, are noted, and these signal intensity and phase differences are
recorded. This record, collected over many pulses, is called phase history data
and is used to create the long synthetic antenna.
To get good range resolution, a SAR transmits what is effectively a very
short pulse by using a very wide bandwidth signal. Most SARs use a long pulse
that is frequency modulated (FM), called a chirped pulse: its frequency smoothly
increases or decreases over the duration of the pulse. It thus has a wide
frequency bandwidth, and in processing it can give the range resolution of a
much shorter pulse having the same bandwidth.
The initial processing of phase history data is done using the assumption
that the intensity of return from each point in the scene is the same for each
pulse. This requires four processing assumptions to be made: that the terrain is
flat, the targets are stationary and have a constant radar cross section, and the
radio frequency environment is quiet. Both natural and artificial features in the
scene typically violate one or more of the above assumptions, so additional
interpretation and analysis has to be done to correct for the resulting artifacts in
the image:
• Because the terrain is not flat, shadowing hides the region behind mountains
and buildings, and layover causes the top of a structure to appear closer to
the radar than it should be.
• Unless the target is a perfect sphere, its radar cross section will change
during the imaging process, causing streaks and image distortion.
SARs can also use polarimetry to obtain signatures that have intelligence
value. They do this by transmitting at least one polarization and receiving two
polarizations. A SAR that both transmits and receives two polarizations (forming
four possible combinations of transmit and receive polarization) is called fully
polarimetric. When the polarized pulse strikes a target and is reflected back
toward the radar, the polarization is changed by the reflecting surface. The
relative amount of horizontal and vertical polarization in the return depends on
the structure, reflectivity, shape, orientation, and roughness of the reflecting
surface. So measuring the returned polarization from an object can provide
additional information about the object.
One of the major advantages of SAR is its ability to detect changes in a
scene over time by making successive passes and imaging the same scene from
the same SAR location. Change detection can identify objects that have entered
or left the scene between imaging passes and can also observe new vehicle
tracks, crops growing or being harvested, soil excavation, and changes in the
terrain surface due to underground construction.
SARs operating in the VHF or low UHF bands can image objects concealed
in foliage. These SARs can also penetrate into dry earth for short distances.
SARs also can be operated in a special mode called Moving Target
Indicator (MTI) or Ground Moving Target Indicator (GMTI) that is designed to
enhance the detectability of target motion. MTI mode can be used to monitor
aircraft, helicopter, or ship movements as well as tracking ground vehicular
movement.
NOTES
1. J. Happer, “Characterization of Underground Facilities,” JASON Report JSR-97-155 (April 1999), accessed 23 September 2012 at
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB372/docs/Underground-JASON.pdf.
2. Merrill Skolnik, ed., Radar Handbook, 3rd ed. (New York: McGraw-Hill, 2008), 17.33–17.34.
3. L. Carin, R. Kapoor, and C. E. Baum, “Polarimetric SAR Imaging of Buried Landmines,” IEEE Transactions on Geoscience and Remote Sensing, Vol. 36, No. 6 (November 1998), 1985–
1988.
4. David J. Daniels, Ground Penetrating Radar, (London, UK: The Institution of Engineering and Technology, 2004), 5.
5. Dai Dahai, Wang Xuesong, Xiao Shunping, Wu Xiaofang, and Chen Siwei, “Development Trends of PolSAR System and Technology,” Heifei Leida Kexue Yu Jishu (February 1, 2008),
15.
6. Zhou Hong, Huang Xiaotao, Chang Yulin, and Zhou Zhimin, “Ground Moving Target Detection in Single-Channel UWB SAR Using Change Detection Based on Sub-aperture Images,”
Heifei Leida Kexue Yu Jishu (February 1, 2008), 23.
7. Sandia National Laboratory, accessed 23 September 2012 at www.thespacereview.com/article/790/1.
8. S. Buckreuss, R. Werninghaus, and W. Pitz, “The German Satellite Mission TerraSAR-X,” IEEE Radar Conference 2008, (May 26–30, 2008), INSPEC Accession No. 10425846, 306.
9. USAF Factsheet, “E-8C Joint Stars,” accessed 23 September 2012 at http://www.af.mil/information/factsheets/factsheet.asp?id=100.
10. Rebecca Grant, “JSTARS Wars,” Air Force Magazine (November 2009), accessed 5 September 2012 at http://www.airforce-
magazine.com/MagazineArchive/Pages/2009/November%202009/1109jstars.aspx.
11. U.S. Air Force, “RQ-4 Global Hawk” (January 27, 2012), accessed 23 September 2012 at http://www.af.mil/information/factsheets/factsheet.asp?id=13225.
12. Jet Propulsion Laboratory, “JPL Imaging Radar,” accessed 23 September 2012 at http://southport.jpl.nasa.gov/.
13. D. Pastina, P. Lombardo, A. Farina, and P. Daddi, “Super-Resolution of Polarimetric SAR Imaging,” Signal Processing, Vol. 83, No. 8 (August 2003).
14. OHB System, “SAR-Lupe,” accessed 23 September 2012 at https://www.ohbsystem.de/sar-lupe-english.html.
15. OHB System, “SAR-Lupe.”
16. Commander Richard J. Schgallis, “Commercial Space for Maritime Awareness,” Geospatial Intelligence Forum, Vol. 8, No. 2 (March 2010), 12–13.
17. Skolnik, Radar Handbook, 17.25–17.27.
18. Ibid., 24.49–24.51.
19. Mark Preiss and Nicholas J. S. Stacy, “Coherent Change Detection: Theoretical Description and Experimental Results,” Australian Department of Defense, DSTO-TR-1851 (August
2006), accessed 23 September 2012 at http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA458753.
20. John L. Morris, “The Nature and Applications of Measurement and Signature Intelligence,” American Intelligence Journal, Vol. 19, Nos. 3 & 4 (1999–2000), 81–84.
21. Preiss and Stacy, “Coherent Change Detection.”
22. Ibid.
23. Sun Xilong, Yu Anxi, and Liang Diannong, “Analysis of Error Propagation in Inteferometric SAR,” Heifei Leida Kexue Yu Jishu (February 1, 2008), 35.
24. Ibid.
25. NASA, “TanDEM-X,” accessed 23 September 2012 at http://ilrs.gsfc.nasa.gov/satellite_missions/list_of_satellites/tand_general.html.
26. Space Daily, “German Radar Satellite TanDEM-X Launched Successfully” (June 22, 2010), accessed 23 September 2012 at
http://www.spacedaily.com/reports/German_Radar_Satellite_TanDEM_X_Launched_Successfully_999.html.
27. Skolnik, Radar Handbook, 17.30–17.33.
28. John W. Ives, “Army Vision 2010: Integrating Measurement and Signature Intelligence” (April 9, 2002), accessed 23 September 2012 at http://www.dtic.mil/cgi-bin/GetTRDoc?
AD=ADA400786.
29. NASA, “North Atlantic Ocean,” accessed 23 September 2012 at http://southport.jpl.nasa.gov/pio/sr11/sirc/naocn.html.
30. Public domain photograph from the U.S. Air Force, available at http://acute.ath.cx/link/motherof.jpg.
31. M. Ulmke and W. Koch, “Road Map Extraction Using GMTI Tracking,” Conference Proceedings of the 9th International Conference on Information Fusion, Florence, Italy (July 10–13,
2006).
13. Passive RF
This chapter is about the collection, processing, and analysis of emissions in the
RF spectrum that have intelligence value. The collection part relies on passive
radio frequency (RF) sensors, which are carried on all of the types of collection
platforms discussed in Chapter 8: aircraft, satellites, UAVs, aerostats, ships,
submarines, and ground sites. These sensors collect and process four basic types
of RF emissions for four different purposes. Three of those types are discussed
in this chapter. The four are
COMINT was treated separately in Chapter 4 for two reasons. First, the
COMINT product is literal, so it logically fits in Part I. Second, not all COMINT
is collected by passive RF sensing. COMINT relies heavily on RF, but it also
uses other collection means, audio collection and fiber-optic cable being two of
the most important.
Any discussion of passive RF collection has to deal with terminology that
can confuse the reader. Most books would title this chapter “Signals Intelligence
(SIGINT)” and would discuss the collection of signals. The first three types
listed above—COMINT, ELINT, and FISINT—are the generally accepted
components of SIGINT. But the term SIGINT causes some difficulty, for the
following reasons:
Not all SIGINT is passive RF. As noted above, much COMINT collection
does not rely on passive RF signals.
Not all passive RF is SIGINT. A number of intentional and unintentional
emissions have intelligence value but do not fall into any of the traditional
SIGINT categories, though they are collected by the same sensors. Technically,
they aren’t signals at all. Collectively, they are referred to as RF MASINT.
So the terminology can be confusing, even more so because common
practice is to say SIGINT when the speaker really means COMINT. In this
chapter, we’ll make frequent use of the terms SIGINT and signal even when
discussing RF MASINT, as a matter of convenience. But you should keep in
mind that RF MASINT is different. And while the chapter focuses on
nonCOMINT signals intelligence, the collection systems, the platforms, and
geolocation all are also important for RF COMINT.
After an overview of the functions performed by ELINT, FISINT, and RF
MASINT, this chapter discusses the process: how passive RF collection works. It
then goes into one of the most important applications of RF sensors in
intelligence—that of geolocation. In some cases, it may be critically important to
geolocate the source of the signal. In others, the source is already known, and the
contents of the signal itself are important.
While all passive RF collection uses much the same collection means, these
subdisciplines have significantly different processes. So separate process
subsections treat ELINT, FISINT, and RF MASINT applications.
Function
Passive RF collection is important for identifying, geolocating, and assessing the
performance of systems that radiate RF energy. The military relies on it for
targeting and for determining the threat posed by weapons systems.
FISINT
RF MASINT
GEOLOCATION
Process
The passive RF collection process, in general, requires that one intercept and
collect the signal, identify the signal as having intelligence interest, associate it
with a specific emitter or identify the source, geolocate it, process and analyze it
to extract useful intelligence, and report the findings. Let’s go through these
steps for the different targets previously described.
PLANNING
Not surprisingly, the planning for passive RF collection differs according to the
intended purpose. ELINT, FISINT, and RF MASINT planning are discussed
below.
FISINT. Instrumentation signals associated with missile and aircraft testing are
associated with specific test ranges, so collection usually requires tip-off of an
impending test. Satellite telemetry is usually available for extended time periods,
so planning for FISINT against satellites can be done more systematically.
COLLECTION
The passive RF sensors used in intelligence generally are a combination of an
antenna, receiver, and signal processor. Some such systems have human
operators working directly with the sensor and so may have display and storage
systems. Remotely operated sensors, such as those on satellites, usually transmit
collected signal information to a ground site. But an antenna and a receiver are
the minimum requirements for all such sensors. The sensor’s performance is
determined almost solely by the design and performance of the antenna and the
receiver.
The same system can be applied to collecting any of the three major types
of SIGINT: COMINT, discussed in Chapter 4; or ELINT or FISINT, discussed in
this chapter. It can also collect RF MASINT. RF collection systems sometimes
are optimized to collect only one of these signal types. An ELINT system carried
on a UAV would likely be designed to collect only OPELINT in the battlefield
area. A clandestine sensor emplaced near a test range might be designed only for
FISINT collection at selected frequencies. Other RF collectors might need to
collect everything in a wide range of frequencies and signal strengths. Satellites
are expensive to build and operate, so they tend to carry very flexible systems
that can handle multiple missions and signal types.
So an RF collection system design typically is based on (1) the nature of the
target signals to be collected, (2) the requirements for geolocating the signals,
and (3) the nature of the collection platform. Each of these design factors is
discussed in the next three sections.
• Geolocation capability
No one type of system does all of these things well. The nature of the
expected target signals determines which of these characteristics is emphasized
in system selection and design. Different designs have been optimized to
perform well for specific purposes. Both the receiver and the antenna have to be
designed to fit their intended usage.
As an example, the trade-offs in the design of collection antennas are size,
gain, beamwidth, and tracking requirements. For high gain, which is desirable
since it allows the system to detect weaker signals, the antenna size is large and
the beamwidth is narrow. However, high-gain antennas have reduced angular
coverage; the performance advantages of the narrow beam (selectivity and
sensitivity) must be balanced against the need to cover large areas. A wideband
receiver needs to use a highly directional antenna in a dense signal environment
to identify and classify complex signals. To cover larger areas it is necessary to
mechanically scan the antenna, use multiple antennas, or use a single antenna
such as a phased array that generates multiple beams.
The solution, in general, is to use a collection of antennas, receivers, and
signal processors of different types working together. One receiver, for example,
may be designed to search for and acquire new signals. Another receiver might
be used to closely examine signals of interest that are detected by the search
receiver. A special processor might then be accessed to measure the signal
parameters, such as pulse width and pulse repetition frequency (PRF). The 3
Narrowband Signals. Narrow bandwidth signals are relatively easy to find in the
spectrum and are especially easy when they operate on a fixed frequency.
Telemetry signals fit in this class. The challenge is that the signals of interest
often are very weak. Because sensitivity is therefore important, collection often
makes use of highly sensitive receivers such as superheterodyne receivers and
the largest practical antennas for the platform. Alternatively, one can sometimes
locate the collection system in close proximity to the target. For close-in work,
where a clandestinely emplaced sensor is located near the target signal, the
antenna has to be small and easily concealed. Such antennas can be not much
more than a short wire or a patch antenna like those used in cell phones.
New Signal Search. The search for new and unidentified signals is a priority for
any RF collection system, but it is especially important in ELINT because these
can indicate the presence of new threat radars. Search systems depend on the
ability to search through a large part of the RF spectrum very rapidly, so as not to
miss what may be a very short duration signal and to do so at the highest
possible sensitivity. Again, no one type of receiver can do all types of new signal
search. If the target is wideband signals, one might use RF radiometers that can
detect the presence of wideband signals but cannot measure signal parameters.
Alternatively, crystal video receivers (which are relatively insensitive) can be
used at short ranges. Where the search is for frequency hoppers, an instantaneous
frequency measurement (IFM) receiver may be preferred; it has good dynamic
range and sensitivity. Where the target is a weak signal, especially in a dense
signal environment, a microscan (a rapidly scanning type of superheterodyne)
receiver may work best.
One of the better general purpose receivers for new signal search is the
acousto-optical receiver (which uses the incoming electrical signal to modulate a
light wave traveling through glass). It combines good frequency resolution and
wide instantaneous bandwidth. It also works very well against a frequency
hopper and is one of the preferred receivers for ELINT.
New signal search antennas also must cover a very broad frequency band.
Although specific radar bands are identified in Table 11.1, radar signals can
appear anywhere in the microwave spectrum. Some antennas are called
frequency-independent antennas because of their wide bandwidth. They come
in a variety of shapes—flat spirals, conical spirals, and log-periodic antennas,
which look vaguely like the traditional rooftop-mounted home TV antennas.
Three antenna types are used to determine angle of arrival: spinners, phased
arrays, and interferometers.
A spinner is a single small antenna that is used for direction finding by
moving the antenna rapidly (usually spinning it to provide 360 degrees azimuth
coverage) and noting the direction the antenna is pointing when the signal is
strongest.
Phased arrays were introduced in Chapter 11. Some arrays are specifically
designed for geolocating targets in SIGINT because they allow instantaneous
coverage of a spatial sector. One widely used array in SIGINT is the circularly
disposed antenna array (CDAA), known commonly as the Wullenweber.
The Wullenweber is a large circular antenna array used by the military to
triangulate high frequency (HF) radio signals for radio navigation, intelligence
gathering, and search and rescue. Because of its immense size and huge circular
reflecting screen, the antenna is colloquially known as the “elephant cage.” The
CDAA was originally developed by the Germans during World War II to receive
transmissions from German submarines in the North Atlantic and to determine
the general locations of the submarines. The name “Wullenweber” was the cover
term they used to identify their CDAA research and development program. Two 5
CDAAs, such as the one shown in Figure 13.3, located sufficiently far apart can
6
Time Difference of Arrival. Cell towers have a more accurate way to geolocate a
signal than DF, and it is extensively used by ELINT systems to geolocate radars
also. It depends on the fact that signals travel at a defined velocity— acoustic
signals at the speed of sound, electromagnetic (EM) signals (including optical
signals) at the speed of light. This speed can be used to geolocate the source of a
signal. The speed of travel differs in different media, which can be a problem for
acoustic signals. But for all practical purposes, the speed of radio waves is the
speed of light. Radars, as noted in Chapter 11, determine the distance to a target
by measuring the time delay for the round trip of a pulse. Cell towers can do the
same, by pinging— sending out a signal to a cell phone—and measuring the
time it takes to receive a response ping from the phone. The measurement
determines distance (though again, multipath can be a problem because it
introduces a time delay).
SIGINT systems do not transmit, so they cannot directly measure the travel
time of a signal from an emitter. They instead make use of an indirect technique
for geolocating a target, called multilateration. It is also known as hyperbolic
positioning. It is the process of locating an object by computing the time
difference of arrival (TDOA) of a signal at different locations. Multilateration is
commonly used in surveillance applications to accurately locate an aircraft,
vehicle, or stationary emitter by measuring TDOA of a signal from the emitter at
three or more receiver sites. The technique also works with acoustic signals,
7
Suppose now that the SIGINT collection system has a third receiver at a
different location, and it also can intercept the signal. This makes a second and
third TDOA measurement available, as Figure 13.4 indicates. A comparison of
the three time differences of signal arrival at the three sensors defines a curve in
space; the emitter must be somewhere on this curve. If the emitter is on the
earth’s surface, the geolocation problem is easily solved: The emitter is located
where the curve touches the earth’s surface. If the emitter is known to be
somewhere above the earth, a fourth sensor would be needed to precisely locate
it on the curve.
9
Figure 13.6 suggests another problem with FDOA by noting that the emitter
must be stationary. Of course, many emitters of intelligence interest are not
stationary; a moving emitter will result in an invalid location unless the ELINT
processing system applies some sort of correction. This is the same phenomenon
that was discussed in the previous chapter: A moving target causes geolocation
error for both SARs and ELINT systems by changing the Doppler shift.
However, either by adding additional FDOA sensors or by watching the change
in FDOA over time, the ELINT system can make the necessary correction.
ambiguities in the target location. For example, if in Figure 13.4 only receivers
20
1 and 2 were operating, then any emitter could only be geolocated to the curve
on the earth that is shown in the figure and labeled “Time difference” (sensor 2
to sensor 1). But if either receiver also could obtain an angle of arrival, the
location of the emitter on the curve could be established.
A completely different technique for improving accuracy is to get some
help from an emitter in the target area that has a precisely known location.
TDOA and FDOA accuracy can be greatly improved by using a reference signal
transmitter, known as a reference emitter or reference beacon. The reference
emitter can be, for example, a radar in the target area, the position of which is
already known, or a GPS-equipped beacon that has been emplaced in the target
area to act as a reference emitter. When a new signal in the target area must be
geolocated, the geolocation system receives both the reference emitter signal and
the new signal and uses some comparison techniques in its signal processors to
reduce the geolocation error.21
RF Tagging and Tracking. RF tags are widely used in intelligence and law
enforcement. Their purpose is to provide a unique identifier for an object that
can be sensed at a distance and used to track the object’s movement. A well-
known example is the use of RF tags to track stolen automobiles. These tags,
which typically include a GPS receiver that tracks the automobile’s position, are
concealed in the automobile to discourage theft. If a tagged auto is stolen, police
can pinpoint its location by receiving the tag’s RF signal.
The widest use of RF tagging, though, is in the commercial sector. The
simplest and most commonly used type of RF tag is the radio frequency
identification (RFID) tag. These tags are extensively used in the retail business
and supply chains to track the movement of goods.
An RFID tag is a microchip combined with an antenna in a compact
package; the packaging is structured to allow the RFID tag to be attached to an
object to be tracked. A computer chip is attached to an antenna, and they are
often referred to together as an RFID tag. Data stored on the chip transmits
wirelessly through the antenna to an RFID reader or scanning device that
operates on the same frequency as the antenna. The tag’s antenna picks up
signals from an RFID reader or scanner and then returns the signal, usually with
some additional data (like a unique serial number or other customized
information).
RFID devices can be active or passive:
• Passive RFID tags get their power from the RFID reader. When an
RFID reader is directed at a passive RFID tag that is tuned to the reader
frequency, the reader sends an EM signal to the tag. The energy received by the
tag effectively is used to power its response to the reader. Passive RFID usually
requires a reader to be within a foot of the chip, but, depending on the frequency,
it can be read from up to 20 feet away.
• Active RFID tags have a battery that provides power to transmit data on
the chip, and it can transmit data to very long distances. Some active tags contain
replaceable batteries for years of use; others are sealed units, designed
essentially as throwaways. Some active tags are connected to an external power
source. 22
RFID tags can be very small. Passive tags can be the size of a large rice
grain. Active devices are typically larger—the size of a small paperback book.
For intelligence uses, the tags have even been placed in personal objects, such as
a walking stick that was provided to Osman Ato, a Somali arms importer. The
tag allowed a U.S. Delta Force team to capture Ato in Mogadishu. 23
Cell phones are, in effect, RFID tags and can be tracked by several
techniques. The phones do not have to be in use. They simply have to be turned
on. One technique compares the strength of the signal received by nearby cell
phone towers to obtain an approximate position of the phone. Much higher
accuracy is possible for phones equipped with a GPS receiver. Cell phones using
the popular standard global system for mobile communications (GSM) that are
GPS equipped can be located to within 10 meters in Europe and to within 25
meters in the United States, South America, and Canada. 24
ELINT Collection. ELINT collection is done from many different platforms. But
increasingly, satellites are used, because they can routinely access targets
worldwide. Several countries operate ELINT satellites, primarily to provide
order of battle intelligence for their militaries. Russia has its Tselina series of
satellites, and China reportedly has several ELINT satellites in orbit.
26
Each type of ELINT platform has its own advantages and limitations.
Satellites provide good earth coverage. At the other extreme, weak signals often
require close proximity collection, which satellites cannot do against ground-
based targets. In between the two extremes, UAVs, aircraft, and ship- or ground-
based systems (used to collect against surface targets, satellites, and aircraft)
have a role. Global Hawk, the VERA-E, and the Norwegian ship Marjata are all
previously discussed examples of ELINT collection platforms.
surface than ground sites or ships. The disadvantage of airborne and spaceborne
sensors is that their accuracy can be no better than their knowledge of their
location when collecting the signals. So it’s important for collectors to time-
stamp collection events and to keep a log of the platform’s position at those
times.
FISINT Collection. Telemetry signals are typically very weak. So FIS collection
is either done at standoff distances using a large antenna and sensitive receiver or
by clandestine collection close in to a test range. But telemetry signals operate
on fixed frequencies that are usually well known, so searching for new signals
doesn’t have to be done often.
RF MASINT Collection
Electromagnetic Pulse. Collection to identify atmospheric nuclear tests
worldwide typically is done by satellites. The United States employs EMP
sensors on its GPS constellation. The constellation provides total earth
surveillance, 24/7.
ELINT, FISINT, and RF MASINT are all handled differently in the processing,
exploitation, and analysis phases. The differences are discussed in the following
sections.
ELINT. Both operational and technical ELINT processing must deal with the
challenge of a dense signal environment. Spaceborne SIGINT systems typically
observe a large portion of the earth’s surface. Airborne systems cover a smaller
portion of the surface, but the coverage still is in the thousands of square
kilometers. In either case, the result is that the system sees a dense signal
environment. In the case of ELINT, for example, many pulses are coming into
the ELINT receiver continuously. The environment becomes even denser if the
receiver has a wide bandwidth, as ELINT systems typically do.
In order to handle this environment, processing typically depends on the
collector putting the pulses in digital form as they arrive. Once digitized, the
signals can be processed in many different ways, depending on what information
is desired about the signal. Next, the ELINT signal processor must assign each
incoming pulse to a specific radar. The desired information then can be
31
pulse train deinterleaving. Pulse train deinterleaving relies on the fact that for
radars having a fixed PRF, the pulses will arrive at a constant rate, and a constant
rate sequence is easy to identify. Radar designers are aware of this technique, of
33
course, and modern radars often make this signal sorting process more difficult
by constantly changing their PRF.
The signal processor then must perform a number of functions that vary
depending on the type of intelligence being collected. After the signals have
been sorted, they must be identified as coming from a specific type of emitter,
assuming that the emitter has previously been collected and analyzed. If the
emitter is of a new type, then technical ELINT processing (discussed later) is
used to analyze the signal parameters. If the emitter has an electronic signature
that is recognized (for example, in an existing signals catalog), then operational
ELINT processing techniques are usually employed (for example, to geolocate
the emitter and to uniquely identify it for future reference).
A wide range of signal processing techniques are used in ELINT, again,
depending on the functions to be performed. Processing of OPELINT is
relatively simple, compared with technical ELINT. The main concerns are to
identify the signal from an existing ELINT library, determine its status,
geolocate it, and get the intelligence out to customers quickly. These
considerations tend to drive OPELINT collection and analysis to be done
intheater by tactical collection systems, but strategic systems such as overhead
collection are used if the results can be provided to customers in a timely
fashion. The emphasis is on the identification and geolocation of specific
emitters. As a result, OPELINT displays often are spatial—that is, a map display
with specific signals or equipment identifiers named and located on the map.
Operational ELINT can do more than just identify a radar by type. It can
also use fine-grain signatures of radar signals to identify and track specific
radars. This technique is called specific emitter identification or fingerprinting.
Just as no two fingerprints are identical, no two radars have identical signal
parameters, even though they may be physically identical otherwise. The
technique normally requires good technical ELINT to first obtain a very detailed
target signature.
FISINT. Complex and expensive systems such as missiles and satellites have a
large number of instrument readings to transmit. It is impractical to devote a
separate transmission link to each reading. Telemetry systems therefore combine
the signals from the readings in a process called multiplexing for transmission
using a single transmitter. Each signal occupies a channel in the multiplex
system. At the receiver, the channels are separated (demultiplexed) and sent to
separate displays or recorders.
Some telemetry systems, especially older ones, multiplex by allocating a
different part of the radio frequency spectrum to each signal; this technique is
known as frequency division multiplexing. A more complex, but increasingly
popular, approach is time division multiplexing, where each signal periodically
gets to use the entire frequency bandwidth of the transmitter for a short time
interval.
Interpretation of intercepted telemetry is difficult, in part because of what is
called the scaling problem. The engineers running the instrumentation know the
scales for the readings they receive and which channels of telemetry come from
which instrument. The intercepting party must often infer both the nature of the
instrument and the scale of the readings from external evidence—correlating the
readings with external events such as aircraft or missile altitude or speed.
Merely to have made a few key identifications brings a considerable
intelligence benefit, because the telemetry analyst can then relate a current
launch to earlier ones and decide whether the launch is one of a series. Also, the
comparison of telemetry with previous launches might indicate the test of a new
vehicle or a new model of a known missile. Given a fair sample of powered-
flight telemetry, an analyst can usually say whether a launch vehicle is liquid- or
solid-fueled, whether it has a single burning stage or multiple stages, and what
ratio of payload to total weight it probably has. The analyst can do this by
looking for characteristic signatures in the different telemetry channels. For
example, the velocity profile of a ballistic missile has a characteristic signature:
Velocity increases steadily with time as the missile accelerates and then flattens
when the motor cuts off. A multiple-stage missile then again increases its
velocity when the second stage motor kicks in. These acceleration patterns create
a unique signature in the telemetry.
Telemetry can be denied to an opponent by encryption, and digital
telemetry that is typically sent by time division multiplexing is particularly
amenable to encryption. Encryption denies the collector information on what are
called telemetry internals (that is, the values of the readings themselves).
Encryption therefore forces the collector to rely on what are called telemetry
externals (that is, changes in the signal due to the flight profile of the vehicle),
which provide information about aspects of the vehicle’s performance. Using34
externals, the flight profile can be measured using the multipath technique
described later in this chapter.
RF MASINT. Atmospheric nuclear testing is very rare; there have been no such
tests since China’s last atmospheric test in 1980. RF damage and nonnuclear
EMP tests are very uncommon, and processing depends on the specific signal. In
the case of nuclear EMP, the signal processing and exploitation will identify the
location of the test (based on time of arrival of the pulse at various collectors)
and provide estimates of burst height and weapons yield. For RF damage and
nonnuclear EMP, processing and exploitation is needed to assess the weapons
performance. Frequency bandwidth and peak power of the signal are two
important measurements that have to be made.
Most unintended emissions are very weak, but sensitive equipment can
detect the signals and locate the emitter or use the characteristic signature of the
emission to identify the target. In addition to highly sensitive receiving
equipment, analysts need highly sophisticated signal processing equipment to
deal with unintentional radiation signals and derive useful intelligence from
them.
DISSEMINATION
Structure
National-level collectors, military field units, and law enforcement organizations
all collect OPELINT to serve military and law enforcement customers. The
military support fits the definition of mass collection discussed previously. Law
enforcement OPELINT collection is more targeted and usually serves immediate
tactical rather than intelligence purposes.
Technical ELINT, FISINT, and unintentional radiation all fit the definition
of boutique collection. They typically are organizationally separate from
OPELINT, being types of targeted collection that support specific intelligence
customers.
FISINT and RF MASINT often have the collection phase organizationally
separated from the processing, exploitation, and analysis phases. That separation
occurs because the same collection systems that are used for ELINT often can
collect FISINT and RF MASINT as well. Though processing and exploitation
could be handled by the collectors, it usually is better handled by an S&T
intelligence center that has specialists in the weapons systems of concern.
Summary
Passive RF sensors used in intelligence usually are called SIGINT collectors and
are used to produce RF COMINT, ELINT, and FISINT. Passive sensors also are
used to collect RF MASINT.
ELINT includes information extracted through the collection, processing,
exploitation, and analysis of signals transmitted by radars, beacons, jammers,
missile guidance systems, and altimeters. Most ELINT is conducted against
radars and divides broadly into two types: operational and technical.
Operational ELINT involves the intercept and analysis of radar signals in
order to locate radars, identify them, and determine their operational status. The
product of operational ELINT is called radar order of battle and is used mostly
for planning and executing military operations.
Technical ELINT is used to assess a radar’s capabilities and performance, to
determine the level of technology used in building the radar, and to find
weaknesses in the radar to help electronic warfare designers defeat it. It involves
either the measurement of radar signal characteristics to a very high order of
accuracy or measurements to determine something about a radar’s operation that
will reveal its detection and tracking capabilities. The highest priority signals for
ELINT collection are always new and unidentified signals.
FISINT includes the interception and interpretation of telemetry that is
transmitted during missile and aircraft testing. Telemetry can be encrypted to
deny the collector information on what are called telemetry internals— the
values of the telemetry readings. Encryption forces the collector to rely on what
are called telemetry externals—changes in the telemetry signal due to changes in
the target’s flight profile.
RF MASINT captures and exploits unintentional emissions of radio
frequency energy from internal combustion engines, electrical generators, and
switches. These emissions are typically weak, but sensitive RF receivers can
detect the signals and locate the emitter or use the characteristic signature of the
emission to identify the target. RF MASINT also includes collection that is
targeted on EMP and RF damage devices.
The two critical components of a SIGINT system are the antennas and
receivers. Both involve trade-offs. Antennas would ideally have high gain and
cover a large spatial volume with wide frequency bandwidth. Improving any one
of these three tends to degrade performance in another. Receivers must trade off
among sensitivity, bandwidth, ability to collect many signals simultaneously,
dynamic range, resolution, and measurement accuracy. A number of receiver
designs exist to optimize one or more of these qualities. As a result, SIGINT
systems often use a mix of different antennas and receivers, each designed to
collect a specific class of signals.
One of the most valuable contributions of SIGINT sensors is in geolocating
and tracking emitters of intelligence interest. The oldest passive RF geolocation
technique is DF, which determines the angle of signal arrival. Because
electromagnetic waves from a transmitter travel in a straight line, the direction of
arrival of the signal is the direction in which the transmitter lies. Spinner
antennas, phased arrays, and interferometers can determine the angle of arrival.
Two such antennas, well separated, can locate a target on the earth. Three can
locate a target in the air or in space.
Another technique for geolocating a radar signal depends on the fact that
EM signals travel at the speed of light. This speed can be used to geolocate the
source of a signal by measuring the time difference of arrival at widely separated
receivers. It is critical to be able to identify specific pulses from the radar for
TDOA to work.
A third technique for geolocation depends on the fact that signals emitted or
received by moving targets have an associated Doppler shift that can be used to
determine target location or speed of movement. Frequency difference of arrival
is a technique similar to TDOA in that one estimates the location of a radio
emitter based on observations from widely separated points. It differs from
TDOA in that the FDOA observation points must be in relative motion with
respect to each other or with respect to the emitter.
A fourth geolocation technique requires the presence of an RF tag on the
target. These tags are often concealed to prevent removal. They typically include
a GPS receiver that determines the target’s location and transmits the
information to a remote receiver.
Because geolocation accuracy is of high importance, a number of
techniques are used to improve it. Geolocation errors can be reduced by using
additional SIGINT collectors above the minimum necessary to geolocate the
target signal. Another method for improving accuracy is to combine several
geolocation techniques; TDOA and FDOA are sometimes used together to
improve location accuracy. Angle-of-arrival information can be combined with
either to help resolve ambiguities in the target location.
NOTES
1. Carey Sublette, “Report on the 1979 Vela Incident” (September 1, 2001), accessed 23 September 2012 at http://nuclearweaponarchive.org/Safrica/Vela.html.
2. P. Hyberg, “Spread Spectrum Radar Principles and Ways of Jamming It,” (Swedish) Defense Research Institute (December 1980).
3. David Adamy, EW 101: A First Course in Electronic Warfare (Boston, MA: Artech House, 2001), 59.
4. Barry Manz, “Is EW Ready for AESA (and Vice Versa)?,” The Journal of Electronic Defense (Washington, DC, September 2012), 31.
5. Michael R. Morris, “Wullenweber Antenna Arrays,” accessed 23 September 2012 at www.navycthistory.com/WullenweberArticle.txt.
6. Photo from www.navycthistory.com/craig_rudy_various.html, accessed 23 September 2012, used with permission.
7. Li Tao, Jiang Wenli, and Zhou Yiyu, “TDOA Location with High PRF Signals Based on Three Satellites,” Chengdu Dianzi Xinxi Duikang Jishu (July 1, 2004), 7.
8. Ibid.
9. Pan Qinge, Yan Meng, and Liao Guisheng, “Joint Location by Time Difference of Arrival and Frequency Difference of Arrival at Multiple Stations,” Heifei Leida Kexue Yu Jishu
(December 1, 2005).
10. Huai-Jing Du and Jim P. Y. Lee, “Simulation of Multi-platform Geolocation Using a Hybrid TDOA/AOA Method,” Technical memo, Defence R&D Canada TM 2004–256 (December
2004), accessed 23 September 2012 at http://pubs.drdc.gc.ca/PDFS/unc33/p523132.pdf.
11. Louis A. Stilp, “Time Difference of Arrival Technology for Locating Narrowband Cellular Signals,” Proceedings of SPIE, 2602 No. 134–144 (1996).
12. Li Tao, Jiang Wenli, and Zhou Yiyu, “TDOA Location with High PRF Signals Based on Three Satellites,” 7.
13. ERA Radar Technology, “VERA-E,” accessed 23 September 2012 at http://www.radiolokatory.cz/pdf/vera-e.pdf.
14. Pan Qinge, Yan Meng, and Liao Guisheng, “Joint Location by Time Difference of Arrival and Frequency Difference of Arrival at Multiple Stations.”
15. K. C. Ho and Y. T. Chan, “Geolocation of a Known Altitude Object from TDOA and FDOA Measurements,” IEEE Transactions on Aerospace and Electronic Systems, Vol. 33, No. 3
(July 1997), 770–783.
16. Ibid.
17. Ibid.
18. Huai-Jing Du and Jim P. Y. Lee, “Simulation of Multi-platform Geolocation Using a Hybrid TDOA/AOA Method.”
19. Pan Qinge, Yan Meng, and Liao Guisheng, “Joint Location by Time Difference of Arrival and Frequency Difference of Arrival at Multiple Stations.”
20. Huai-Jing Du and Jim P. Y. Lee, “Simulation of Multi-platform Geolocation Using a Hybrid TDOA/AOA Method.”
21. Layne D. Lommen, David O. Edewaard, and Henry E. Halladay, “Reference Beacon Methods and Apparatus for TDOA/FDOA Geolocation,” USPTO Application No. 20070236389
(October 10, 2007).
22. Technovelgy.com, “RFID Tags,”accessed 23 September 2012 at www.technovelgy.com/ct/Technology-Article.asp?ArtNum=50.
23. Jeffrey T. Richelson, The U.S. Intelligence Community, 5th ed. (Boulder, CO: Westview Press, 2008), 25.
24. GpsSpying.com, “Mobile Phone Tracking System via the GPS-TRACK Satellite Network,” accessed 23 September 2012 at http://www.gpsspying.com/.
25. Department of Homeland Security, “When Your Ship Comes In” (July 2007), accessed 23 September 2012 at http://www.dhs.gov/when-your-ship-comes.
26. Ian Easton and Mark A. Stokes, “China’s Electronic Intelligence (ELINT) Satellite Developments,” Project 2049 Institute, February 23, 2011, accessed 13 September 2012 at
http://project2049.net/documents/china_electronic_intelligence_elint_satellite_developments_easton_stokes.pdf.
27. CNES report, “Mapping Radar Stations from Space,” accessed 13 September 2012 at www.cnes.fr/web/CNES-en/5940-elisa.php.
28. Federation of American Scientists, “Exocet AM39/mm.40,” accessed 13 September 2012 at www.fas.org/man/dod-101/sys/missile/row/exocet.htm.
29. Nickens Okello, “Emitter Geolocation with Multiple UAVs,” Proceedings of the 9th International Conference on Information Fusion (Florence, Italy, July 10–13, 2006).
30. Jeffrey P. Rhodes, “The Machines of Special Ops,” Air Force Magazine (August 1988), accessed 28 August 2012 at http://www.airforce-
magazine.com/MagazineArchive/Pages/1988/August%201988/0888sof.aspx.
31. Adamy, EW 101, 112–120.
32. Richard G. Wiley, ELINT: The Interception and Analysis of Radar Signals (Boston, MA: Artech House, 2006), Chapter 13.
33. Adamy, EW 101, 82.
34. Angelo Codevilla, Informing Statecraft (New York: The Free Press, 1992), 122.
35. David S. Brandwein, “Telemetry Analysis,” accessed 13 September 2012 at https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/v018n04/html/v08i4a03p_0001.htm.
36. Yang Shihai, Hu Weidong, Wan Jianwei, and Zhou Liangzhu, “Radar Detection of Low Altitude Target in Multipath,” Beijing Dianzi yu Xinxi Xuebao (April 1, 2002), 492.
37. Ibid.
14. Acoustic and Seismic Sensing
Function
Acoustic sensors are used both in military operations and in intelligence to
identify and track ships, submarines, land vehicles, and airborne platforms. They
can locate these targets and determine their speed and direction of motion based
on sound transmitted through the air or earth. Such sensors can be readily
deployed and disguised in all types of terrain. Most of the sensing of sound in
1
Process
PLANNING
COLLECTION
Acoustic collection works best under conditions where sound carries well over
large distances, as sound does underwater and infrasound does in the earth under
certain conditions. For example, the use of passive sonar to obtain the signatures
of submarines and to locate them is well known. The submarine’s turbines,
propellers, and other onboard machinery generate acoustic noise that can be
detected and used for identification at ranges of many kilometers in water.
But sensing often is done at very short ranges for intelligence purposes.
Figure 14.1 illustrates the general ranges at which sound and infrasound sensing
are carried out at different sound and infrasound frequencies. Following is a
discussion of some of the types of signatures that are encountered and how they
are used.
Acoustic and Seismic Sensing. The sensing of atmospheric sound for military
purposes has a long history, but until World War I it relied on the use of our
unaided ears. World War I saw the first deployment of acoustic sensors on the
battlefield—their purpose was to locate enemy artillery by triangulating on the
sound of cannon fire.2
Under favorable atmospheric conditions, sound will propagate in the air for
relatively long distances. Usually, this happens when a temperature inversion
exists near the ground (that is, when temperature increases with altitude, instead
of the normal decrease). Sound also will propagate farther over water or
downwind.
Many of the techniques currently used for acoustic and seismic collection
on the battlefield were developed in the previously discussed Igloo White
program during the Vietnam War. U.S. aircraft dropped several types of sensors
along the Ho Chi Minh trail, all equipped with radios that communicated
acoustic signatures back to specially equipped aircraft. One type of air-dropped
sensor came down on a camouflaged parachute and caught in the trees, where it
could monitor sound in the area. A seismic sensor (with no parachute) buried
into the ground due to impact. The antenna, which looked like stalks of weeds,
was the only part showing above ground. Many sensors had to be dropped,
because not all of them landed favorably, and in any event, the batteries only
lasted for a few weeks. Igloo White sensors also were clandestinely deployed by
ground teams in some locations.
The sensors tracked the direction and speed of passing truck convoys. From
those data, it was easy to determine where the trucks were going and when they
were likely to get there. If the target was attractive enough to attack, strike
aircraft could be on the scene in about five minutes. The sensors continuously
updated the location of the trucks as the strike aircraft approached.
4
buried about 18 inches underground. Earth movement will cause slight bends in
the cable, and these bends change the amount of laser light that is backscattered
from the cable. Computer algorithms then are used to locate and identify the
source of the vibration or earth movement. The sensor can identify foot traffic
and specific vehicles and track their movements. 7
Monitoring of Foot and Vehicle Traffic. At short ranges, seismic sensors can
detect and often identify specific types of foot or vehicle traffic. Their use for
battlefield intelligence in the 1960s during the Vietnam War was described
earlier. The geophones on the Ho Chi Minh trail relayed data and information to
a command center, where analysts converted the data into targeting information
for use by combat units.8
• Water flow over the vessel’s hull, which becomes more important at vessel
speeds above about 10 knots
• Crew activity
Underwater sound is collected by a passive device called a hydrophone
(essentially a microphone that is designed to operate most effectively
underwater). Hydrophones are used for both short-range (sonar) and long-range
sensing.
Sonar (sound navigation and ranging) is a well-known technology; it has
been used by sea creatures for communication and object detection for millions
of years. During World War I, the need to detect submarines resulted in major
advances in both active and passive sonar technology. Hydrophones
subsequently were mounted on ships and submarines. Sonobuoys, first
developed by the British in 1944, could be dropped by an aircraft to remotely
identify and track submarines. A sonobuoy is simply a hydrophone attached to a
flotation device (buoy); the buoy carries a radio transmitter that transmits a
received sound signature to the aircraft.
The signature shown in Figure 14.8 was collected at a relatively short
range, as many acoustic signatures are. But acoustic signals also travel to great
distances in oceans within a natural waveguide, sometimes called a sound
channel. The sound channel is a layer in the oceans, about 1 kilometer deep, that
is somewhat isolated from the ocean layers above and below. Once in the
channel, sound tends to stay in it and travel long distances without significant
amounts getting to the surface. Sound created at the surface (from ships and
waves) does not easily get into the sound channel. But low-frequency sound
generated by submarines readily enters the sound channel and can be detected at
long ranges.
The operational challenge in underwater acoustics is to detect the signature
of a ship or submarine in a very difficult environment. Underneath the surface,
the sea is a noisy environment. This background noise can make it difficult to
receive an acoustic signal. For example, the signal can be disrupted or even
blocked by changes in water temperature as the signal travels. Other factors,
including variations in depth, salinity, and the nature of the seabed, also affect
the propagation of sound under water. In relatively shallow water such as that of
the Baltic and North Seas, acoustic propagation is a very complex process, and
signatures are often very difficult to obtain. But because underwater sound can
propagate in so many different modes, it is possible to collect signatures at both
short and long ranges using a combination of sensors.
In the mid-1950s, the U.S. Navy took advantage of the sound channel,
installing an underwater surveillance system to track submarines at long
distances. The sound surveillance system (SOSUS) is a multibilliondollar
network of hydrophone arrays mounted on the seafloor throughout the Atlantic
and Pacific oceans. These hydrophone arrays listen to the low-frequency sounds
in the sound channel, record them, and transmit the data via undersea cables
back to shore stations for analysis. A hydrophone array obtains high sensitivity
in the same way that a radio-frequency phased array does. It adds the signals
from the desired direction while subtracting signals from other directions. The
array is steered electronically by adding the signals received from each
hydrophone in a specific time sequence.
A hydrophone array can also be towed behind a ship or submarine instead
of being fixed to the ocean bottom. Most commonly, such an array of
hydrophones is towed in a line behind a vessel, but two- or three-dimensional
arrays are also used. The integrated undersea surveillance system (IUSS),
which incorporates SOSUS, also includes mobile acoustic arrays that cue
operations of tactical antisubmarine warfare forces. IUSS provides the U.S.
Navy with its primary means of detecting and identifying foreign submarines in
the open ocean.10
Figure 14.4 illustrates how a hydrophone array works. The sound from a
11
In the decade following the August 1949 Soviet nuclear test, the United
States established a system for infrasound detection and deployed a network of
seismic stations to monitor underground testing. Over the years, the Soviet
Union conducted a number of tests at known testing areas, and these were
relatively easy to identify.
The first Soviet underground test was detected in 1961 in an area some 40
nautical miles south of the atmospheric nuclear test site located at Semipalatinsk,
in Kazakhstan. Prior to this event, the area in question was not a known test site.
However, the area in which the event occurred was not an earthquake zone, was
located close to a known test area, and contained sizable mountains suitable for
underground testing. The intelligence community therefore concluded that this
was indeed a probable underground test site.15
Geolocating Acoustic and Seismic Sources. Two techniques are commonly used
to geolocate an acoustic or seismic source: measuring the direction of arrival and
measuring the time difference of arrival. Both depend on having at least two
widely separated sensors to do the geolocation, and both resemble the
geolocation techniques used for RF signal geolocation.
The technique of measuring the angle of arrival dates back to World War I,
as noted earlier. Several European countries developed acoustic arrays to
measure the direction of arrival of sound from artillery fire. Two such arrays
17
that were well separated could triangulate on the source of the sound, much as
angle of arrival measurement does for RF signals intelligence. The technique
works for atmospheric, underwater, and underground sound geolocation.
The second geolocation method depends on accurate measurement of the
time of arrival of the sound again at widely spaced sensors. The time delays
measured by such a sensor array allow one to triangulate on the source and
pinpoint the location of the noise. The technique is very similar to the time
difference of arrival (TDOA) method discussed in Chapter 13, with one very
important difference. As noted earlier, the speed of EM signals can be assumed
to be the speed of light; it is not as simple with sound waves.
The problem is that the velocity of underground sound propagation varies
greatly. In soil, it typically is 500 meters per second; in solid rock it is 5,000
meters per second. Even in the atmosphere, the speed of sound varies, though
not as much as in the earth. Underwater sound speed is the most predictable,
around 1,500 meters per second, but it also varies, increasing with increasing
pressure, temperature, and salinity.
So, identifying the source of a sound based on time of arrival can be a
challenge. Furthermore, it is difficult to determine the depth in the earth or ocean
of a sound source using a sensor array that is located near the surface. To obtain
a source depth, the array must be run down a vertical borehole in the earth or
deployed vertically in the ocean.
significant power in the acoustic spectrum from above 200 Hz down to about 25
Hz. There are distinct narrowband features at harmonic frequencies representing
the rotary motion of the engine’s cylinders and the periodic slap of slightly
asymmetric tires as they roll along the ground. Narrowband features such as
these can be used in signal-processing algorithms to enhance detectability and
allow identification of the vehicle type.
In the case of moving vehicles with sharp acoustic spikes like those shown
in Figure 14.6, one can use the Doppler shift of one or more of these features to
obtain a radial velocity measurement. With multiple sonic detectors at different
locations, the vehicle’s direction of travel and range can be estimated.
Furthermore, the amount of detail present in the signature could permit
intelligence analysts to identify specific vehicles and track their movements. 20
The spectrogram in Figure 14.8 shows the acoustic signature of the large
National Oceanic and Atmospheric Administration (NOAA) ship Ronald H.
Brown as it approached a hydrophone site in the equatorial Pacific Ocean. The
horizontal, continuous, yellow-colored lines, or bands of noise, are created by
the rotation of the propeller blades. In the figure, strong lines occur at 21, 35,
and 42 Hz. The military routinely uses the characteristics of these blade lines to
identify ship characteristics and class, and often individual vessels.23
Seismic and Teleseismic Intelligence. Because there are so many seismic events,
and because the main objective of seismic intelligence is to detect nuclear
testing, the first step is to use the signature information to screen events (that is,
to confirm that an event either is particularly suspicious or appears not to have
features associated with a nuclear explosion).
• Events are then screened based on their depth. For example, an event
may have its depth estimated with high confidence as 50 kilometers below the
surface. It is highly unlikely that a nuclear detonation would occur below 10
kilometers depth, so such an event would be screened out.
• If the event appears to occur at a shallow depth in a region not known
for earthquakes, the next step is to closely examine the signature. This requires a
signature library based on past events. In an area where earthquakes are common
(such as in much of China), an archive of the earthquake signatures is gradually
being built up by monitoring stations. As a result, there exists a large population
24
Once the detections from a seismic event have been associated and an
accurate location estimate has been obtained, the next step in monitoring is that
of event identification. This requires close analysis of the event signature and
comparison with the signatures in a signature library.
Regional waves are of several types, all propagating only at shallow depths
(less than 100 kilometers). These waves typically do not propagate to teleseismic
distances. They are affected by the geology of the earth’s crust and uppermost
mantle; this geology varies greatly around the globe. As a result, regional waves
are more complex and harder to interpret than teleseismic waves. Regional wave
intensities recorded up to about 1,200 kilometers from a shallow source are
typically greater than teleseismic wave intensities recorded at distances greater
than 1,800 kilometers. Teleseismic signals from sub-kiloton explosions are often
too weak to be detected, but regional signals from such explosions are
detectable.26
Between 1961 and 1989, the Soviets conducted 340 underground nuclear
tests at their Semipalatinsk test site. These tests were mostly detected at the time
by Western seismologists using teleseismic signals. After the breakup of the
Soviet Union, archives of regional signals from Central Asia became openly
available. An investigation of those signals revealed 26 additional nuclear
explosions at Semipalatinsk, most of them sub-kiloton, that had not been
recognized using teleseismic signals. 27
Because seismic sensors have very low detection thresholds, a large number
of seismic events are detected and analyzed each year. More than 7,000
earthquakes occur worldwide with magnitudes greater than or equal to 4, and
about 60,000 with magnitudes greater than or equal to 3, in a year. The 28
The regional waves, as noted earlier, are of different types. The main two
types are called P waves and S waves. P (for pressure) waves are compressional
waves, similar to sound waves in the air. S (for shear) waves are transverse
waves; that is, they move from side to side or up and down, like waves on the
sea surface. Because underground explosions compress the surrounding earth,
they radiate seismic P waves efficiently. In contrast, earthquakes result from
sliding or rupture along a buried fault surface and therefore create the transverse
motions of S waves. Explosions will create strong P waves and weak S waves,
while earthquakes will create weak P waves and strong S waves. P waves can be
identified because they travel faster and are therefore the first to arrive at the
monitoring stations.
significant the difference can be. At the top of the figure is the seismic signature
taken from India’s nuclear test of May 11, 1998. The signature was recorded at a
monitoring station at Nilore, Pakistan. At the bottom is an earthquake measured
at the same station. The differences in the P and S waves from the two events are
clearly seen.
31
DISSEMINATION
Battlefield acoustics typically are used for operational rather than intelligence
purposes, and so dissemination is very rapid and directly to combat units. The
products from Steel Rattler and Steel Eagle sensors described in Chapter 8
exemplify the approach. Information acquired by Steel Rattler in the field is
transmitted in small packets by a built-in low-power satellite communication
system. Steel Rattler uses advanced acoustic and seismic detection algorithms to
categorize and identify various heavy vehicles down to the number of cylinders
in the engine. The resulting analysis is compared against an onboard library of
known vehicles and a statistical match is determined. Several sensors working
together can track the vehicle movement. 32
Structure
Because the primary purpose of underwater sound sensing is to identify and
locate ships and submarines, this is considered a naval mission, and that is where
it is organizationally placed.
The U.S. Navy reportedly uses specially configured attack submarines to
obtain the acoustic signatures of foreign submarines. The program reportedly
began in 1959, targeted on obtaining a signature library of Soviet submarines.
After the end of the Cold War, the Navy program was expanded to include
obtaining the acoustic signatures of all potential threat submarines worldwide.
After 9/11, cargo vessels entering the United States became a matter of concern
because of the possibility that a ship could be used in a terrorist attack. The
result was an expansion of the signature library to include more than 120,000
merchant ships. 33
signal analysts can locate the source of an explosion by comparing the time of
arrival of the signal at each sensor.
Summary
Sound and infrasound sensing, called geophysical intelligence, involves the
collection, processing, and exploitation of environmental disturbances
transmitted through or over the earth at audible (above 20 Hz) or infrasound
(below 20 Hz) frequencies. Such collection works best under conditions where
sound carries well over large distances, as sound does underwater and infrasound
does in the earth under certain conditions. Sensors that detect low-frequency
sound (infrasound) are an exception to the rule that non-EM sensors have short
detection ranges. Depending on the strength of the source, such sound can be
detected at distances of thousands of kilometers.
But acoustic sensing often is done at very short ranges for intelligence
purposes. Battlefield intelligence increasingly makes use of short-range sound or
infrasound collection. Land and air vehicles such as trucks, tanks, helicopters,
and UAVs typically have a continuous acoustic power spectrum that extends
from a few hundred Hz down to a few tens of Hz. Many such vehicles also have
distinct narrow-band acoustic signatures that allow vehicle identification.
Surface ships and submarines emit high levels of underwater noise that can
be detected and tracked by hydrophones at ranges of many kilometers. This
specialized area of unintentional emissions intelligence is often called ACINT.
The operational challenge in underwater acoustics is to detect the signature of a
ship or submarine in the noisy ocean environment. For longrange sensing up to
thousands of kilometers, long arrays of hydrophones are used.
Closely related to underwater acoustic sensing is seismic sensing, the
detection and measurement of seismic waves that travel through the earth. A
seismic signal or wave is created by earth vibration. Both man-made and natural
activity can cause earth vibration; the vibration may be slight (a man walking on
the earth or sound impact on the earth from an aircraft flying overhead) or very
strong (an earthquake or large underground explosion).
A teleseismic signal is the result of a seismic movement, usually initiated
by a strong disturbance in the earth that is recorded far from its source.
Explosions and earthquakes cause such disturbances. Explosions create a
different teleseismic signature than earthquakes, so the two can be distinguished.
But teleseismic means alone cannot distinguish between chemical and nuclear
explosions unless the explosion yield is too large to be chemical; the signatures
are otherwise identical. At intermediate ranges between teleseismic sensing and
short-range seismic sensing, midrange or regional waves can be sensed to detect
and characterize explosions.
NOTES
1. B. Kaushik and Don Nance, “A Review of the Role of Acoustic Sensors in the Modern Battlefield,” paper presented at the 11th AIAA/CEAS Aeroacoustics Conference (May 23–25,
2005), accessed 28 August 2012 at https://ccse.lbl.gov/people/kaushik/papers/AIAA_Monterey.pdf.
2. Ibid.
3. Christopher Stubbs, “Tactical Infrasound,” JASON Report JSR-03-520, The MITRE Corporation (May 9, 2005).
4. John T. Correll, “Igloo White,” Air Force Magazine (November 2004), Vol. 87, No. 11, accessed 23 September 2012 at http://www.airforce-
magazine.com/MagazineArchive/Pages/2004/November%202004/1104igloo.aspx.
5. Tien Pham and Leng Sim, “Acoustic Detection and Tracking of Small, LowFlying Threat Aircraft,” U.S. Army Research Laboratory, accessed 28 September 2012 at
http://projects.mindtel.com/2005/SDSU.Ge01600.Sensor_Networks/sensornets.refs/2003.%20ASC.%20Army%20Studies%20Conference/JP-
25%20ACOUSTIC%20DETECTION%20AND%20TRACKING%200F%20SMALL%20LOW%20FLYING%20THREAT%20AIRCRAFT.pdf.
6. Kaushik and Nance, “A Review of the Role of Acoustic Sensors in the Modern Battlefield.”
7. William Matthews, “Tracking Noises—with Light,” Defense News (May 10, 2010), accessed 23 September 2012 at http://www.defensenews.com/story.php?i=4612633&c=FEA&s=TEC.
8. Correll, “Igloo White.”
9. Steve Norton, I. J. Won, Alan Witten, Alex Oren, and Frank Funak (Geophex, Ltd.), “Time-Exposure Acoustics for Imaging Underground Structures,” Final Report (September 30, 2003),
accessed 23 September 2012 at http://handle.dtic.mil/100.2/ADA417769.
10. IUSS Caesar Alumni Association, “IUSSHistory 950–2010,” accessed 23 September 2012 at http://www.iusscaa.org/history.htm.
11. Graphic from University of Rhode Island, “Discovery of Sound in the Sea,” accessed 23 September 2012 at www.dosits.org/gallery/tech/bt/ha1.htm.
12. Gurlap Systems, “Broadband Seismometer,” accessed 23 September 2012 at http://ida.ucsd.edu/pdf/cmg-3t.pdf.
13. National Research Council of the National Academies of Sciences, “The Comprehensive Nuclear Test Ban Treaty: Technical Issues for the United States” (Washington, DC: National
Academies Press, 2012), 60, accessed 23 September 2012 at http://www.nap.edu/catalog.php?record_id=12849.
14. Ibid., 45.
15. James R. Shea, “Winnowing Wheat from Chaff,” Studies in Intelligence, Vol. 13, No. 3 (Fall 1969), 20, accessed 23 September 2012 at https://www.cia.gov/library/center-for-the-study-
of-intelligence/kent-csi/v0113n04/pdf/v13i4a03p.pdf.
16. National Research Council, “The Comprehensive Nuclear Test Ban Treaty,” 61.
17. Kaushik and Nance, “A Review of the Role of Acoustic Sensors in the Modern Battlefield,” 2.
18. Correll, “Igloo White.”
19. From S. Tenney, Army Research Laboratory, quoted in Christopher Stubbs, “Tactical Infrasound,” JASON Report JSR-03-520, The MITRE Corporation (May 9, 2005).
20. Ibid.
21. Gregory Crawford, “Netted Sensor Fence for Homeland Defense,” accessed 23 September 2012 at www.mitre.org/news/events/tech04/briefings/1406.pdf.
22. Daniel Frei, “International Humanitarian Law and Arms Control,” International Review of the Red Cross, (November–December 1988), 491–504, accessed 23 September 2012 at
www.loc.gov/rr/frd/Military_Law/pdf/RC_Nov-Dec-1988.pdf.
23. Andra M. Bobbitt and Sharon Nieukirk, “A Collection of Sounds from the Sea,” NOAA Pacific Marine Environmental Laboratory, accessed 23 September 2012 at
www.oceanexplorer.noaa.gov/explorations/sound01/background/seasounds/seasounds.html.
24. Ibid.
25. Shea, “Winnowing Wheat from Chaff,” 20.
26. National Research Council, “The Comprehensive Nuclear Test Ban Treaty,” 111.
27. National Academy of Sciences, “Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty” (Washington, DC: National Academy Press, 2002), 39.
28. Ibid., 42.
29. Ibid., 21.
30. Ibid., 44.
31. Lawrence Livermore National Laboratory, “Seismic Monitoring Techniques Put to a Test,” S&T Review (April 1999), 18.
32. Kevin T. Malone, Loren Riblett, and Thomas Essenmacher, “Acoustic/Seismic Identifications, Imaging, and Communications in Steel Rattler,” Sandia National Laboratories, published
in SPIE, Vol. 3081, 158–165, accessed 19 July 2012 at http://lib.semi.ac.cn:8080/tsh/dzzy/wsqk/SPIE/v013081/3081–158.pdf.
33. Lieutenant-Commander David Finch, “Acoustic Surveillance and Maritime Domain Awareness,” Canadian Naval Review, Vol. 3, No. 1 (Spring 2007), 15 accessed 15 September 2012 at
http://naval.review.cfps.dal.ca/archive/3175534–3196361/v013num1art4.pdf.
34. National Radiation Laboratory of New Zealand, “CTBT International Monitoring,” accessed 23 September 2012 at www.nrl.moh.govt.nz/about/ctbtinternationalmonitoringsystem.pdf.
15. Materials Intelligence
Function
Materials sensing and sampling are important for many areas of intelligence
interest. They support military planning and operations. They are used to
identify nuclear testing, nuclear materials production and movement, and
chemical warfare production. Economic intelligence uses materials sampling to
assess factory production. Materials collection can also include sensing or
sampling for environmental monitoring, which increasingly is an intelligence
concern because some governments and industrial enterprises attempt to conceal
their pollution activities. Materials sampling also has long been practiced in law
enforcement, and one of its premier practitioners is fictional: Sherlock Holmes,
who, as he modestly admitted, could “distinguish at a glance the ash of any
known brand either of cigar or of tobacco.”1
Nuclear sensing and sampling for intelligence currently have two functions and a
third possible function.
Chemical signatures are widely used for environmental monitoring and in law
enforcement. For example, the presence and source of water pollutants can be
determined by remote sensing and water sampling to detect specific pollutant
signatures. Similar techniques can be used for air pollution monitoring. Law
enforcement uses such sensing to detect chemical signatures in the air that
indicate the presence of illicit methamphetamine laboratories.
In intelligence, chemical signatures are used mostly to identify effluents
from factories to determine what processes are being used in the factory. The
most common requirement is to characterize facilities that are suspected of
producing weapons of mass destruction. Such characterization relies heavily on
the ability to identify the signatures of chemical effluents from these facilities. A
gaseous diffusion plant that is intended to enrich uranium produces several
effluent signatures; uranium hexafluoride and its decomposition products all
have unique chemical signatures. A nuclear fuel reprocessing plant produces a
wide range of effluents, each of which has a unique signature that can help
identify the plant’s purpose. Nerve agents that are produced for chemical
3
warfare purposes also produce effluents that have unique signatures and indicate
the specific agent being produced.
Materials sampling also is used to conduct industrial espionage. Samples of
metals and other compounds in or near a factory can reveal information about
the processes being used to produce both military and civilian equipment.
Chemical sampling using special purpose sensors has come into
prominence as a result of the growing worldwide threat of chemical terrorism.
But chemical sampling has been used to provide intelligence for years. Many
industrial processes generate and release telltale chemicals; their signatures can
provide information about the activities taking place within a facility. The ability
to detect the chemicals released into the environment from a facility can provide
a powerful means for monitoring treaty compliance or detecting weapons
production activities.
With the increasing importance of tracing explosives (especially those used
in improvised explosive devices [IEDs]), materials sampling and analysis have
become an even more valuable tool for intelligence organizations, the military,
and law enforcement.
Magnetic field sensing can detect the presence or motion of vehicles, ships, or
submarines at short ranges by the weak changes they create in the earth’s
magnetic field. Magnetic sensing only works against materials that react to
magnets (known as ferromagnetic materials). These sensors can, at very close
ranges, detect ferromagnetic objects such as weapons and some IEDs. They have
been used for weapons screening at passenger checkpoints for years, though
newer types of scanners are replacing them.
Process
PLANNING
COLLECTION
Materials sensing relies on some kind of sensor that can obtain a signature that is
unique to the material. Sensors that can obtain such materials signatures
typically detect either nuclear radiation or the presence of ferromagnetic material
such as steel. All these sensors function only at relatively short ranges. Chemical
signatures, though, can be collected remotely by spectral sensing as discussed in
Chapter 10.
Sampling, as the name implies, uses no sensor; a physical sample of the
material is collected and sent to a laboratory for processing. Both nuclear
material and chemicals are collected by sampling. Some sampling is done
overtly, but much of the sampling for intelligence purposes is done clandestinely,
using HUMINT assets.
There are two ways of doing materials collection, as noted above.
Collection of nuclear and chemical material signatures often is done by using
sensors that can detect nuclear radiation or the spectral signature of the material.
Sensors can be clandestinely emplaced near a factory or weapons facility, and
the results can be communicated to a remote location for analysis. Alternatively,
one can physically collect a sample of the material for subsequent exploitation
and analysis. Collection of materials samples has been done by air, soil, and
water sampling.
Nuclear Materials Sensing
Nuclear Materials Signatures. Nuclear signatures are the physical, chemical, and
isotopic characteristics that distinguish one nuclear or radiological material from
another. Radioactive materials emit one or more types of radiation, such as alpha
particles (helium nuclei), beta particles (electrons or positrons), neutrons, and
gamma rays. The specific combination of particles and rays emitted, along with
the intensity of each type, constitutes a signature that allows for identification of
the radioactive source material. The primary materials of intelligence concern
are the three fissionable isotopes— uranium-233, uranium-235, and plutonium-
239—though any radioactive material that could be used in a dirty bomb is of
concern as well.
All nuclear reactions result in the emission of particles and waves—
neutrons, electrons, ions, gamma rays, or X-rays. X-rays and gamma rays fall
into the electromagnetic (EM) spectrum (being at shorter wavelengths than
ultraviolet, or UV, radiation). But because they fit best in a discussion of the
other types of nuclear radiation, they are included here.
The radiation is strongest from a surface or atmospheric nuclear detonation,
but nuclear power reactors also emit. The strength and type of radiation allow
one to characterize the emitter. A number of nuclear radiation detectors have
been developed; one of the oldest is the Geiger counter, which operates by
sensing the ionization effect caused by the presence of radiation. Modern solid-
state radiation sensors are more sensitive and are capable of detecting concealed
nuclear devices at close ranges. Some are quite small, the size of a shirt button.
In most cases, nuclear radiation detectors are effective only if they are
relatively close to the source. For example, the signature from a plutonium
weapon’s spontaneous decay processes will be gamma rays and neutrons. But
the threshold for detection of neutrons is about 15 meters from a nuclear
weapon. Beyond that range, background noise (that is, the background of
naturally occurring neutrons) overrides the weapon signature. Nuclear materials
detectors therefore have relatively short detection ranges and are best suited for
choke points and monitoring portals or where one has good a priori intelligence
about the presence of the nuclear material.
Close-in Sensing. X-ray and gamma ray detectors are being developed to address
a threat of increasing intelligence concern: Dirty bombs, using conventional
explosives that spread radioactive materials such as cesium-137, can be
developed by terrorist groups. Substantial supplies of radioactive material that
could be made into dirty bombs exist worldwide.
Such weapons can be detected at choke points by a combination of gamma
ray detectors and X-ray scanners. If the radiation source is unshielded, the
gamma ray detector can sense it. If it is shielded (for example, by lead), then an
X-ray scanner will observe a large opaque blob that can be further investigated.
Any technique used to conceal radioactive material tends to make it more
vulnerable to detection.4
Air Sampling. This method of detecting nuclear debris is often thought to date
from the late 1940s, when the United States began to monitor atmospheric
nuclear tests. Sampling actually began during World War II. Concerned about
possible German development of an atomic bomb, the United States developed a
capability to capture and analyze xenon-133, a radioactive gas that is emitted by
operating nuclear reactors. The device was installed and tested on a B-26 light
bomber. After the war, the sampling missions were assumed by USAF’s Air
Weather Service. The service first used specially equipped WB-29 aircraft and
subsequently switched to RB-57s, which could fly at the higher altitudes that
were more desirable for collecting nuclear debris samples. 6
Air samples taken over the Pacific Ocean were used to detect the first
Soviet nuclear test in late August 1949. Air sampling became even more
important after the Limited Test Ban Treaty of 1963. The treaty banned its
signatories from nuclear testing underwater, in the atmosphere, and in space. It
did not provide for an independent international monitoring system; it instead
depended on the major powers’ satellite collection assets, the national technical
means (NTM) discussed in Chapter 8. NTM assets were directed at keeping
track of each government’s nuclear programs and possible testing by new
entrants into the nuclear weapons club. These overhead assets may provide a
7
warning, but they can miss carefully concealed test preparations (as they did in
the Indian nuclear tests of 1998). Satellite sensors may even miss the test itself
or give an ambiguous signature, as in the suspected South African or Israeli
nuclear test discussed in Chapter 10. Therefore, air sampling, combined with
underground acoustic monitoring, is important as a cross-check on the
effectiveness of NTM.
Above-ground testing produces an abundant amount of radioactive isotopes
(called radionuclides) that can be detected. But underground testing also releases
radioactive substances into the atmosphere. It is very difficult to contain the
gases released in a nuclear explosion. If a nuclear test occurs, radioactive
particles and gases might be vented at the time of the test, or radioactive gases
might subsequently seep out through the cracks in the rocks above the explosion.
Past experience at the test sites shows that even the most skillfully conducted
underground explosions may vent these gases unpredictably. All the Soviet
underground tests at Novaya Zemlya and about half of the underground tests at
the Semipalatinsk test site in Kazakhstan resulted in the release of radioactivity,
according to Russian reporting; more likely, all their tests did.
8
The noble gases—argon, xenon, and krypton—are the primary targets for
collection and analysis to detect underground nuclear testing. These gases, like
the noble gas helium, do not react chemically with other elements. Therefore,
they will seep through rock cracks without being absorbed by the rock, and they
will not be scrubbed out of the atmosphere by rain. Furthermore, they have
different half-lives, which makes collection challenging but helps in exploitation
and analysis. The challenge is to collect the samples before they decay—as all
radioactive elements do. Argon-37 has a half-life of 35 days. Xenon-133 has a
half-life of 5 days, and xenon-135 has a half-life of 9 hours. An intelligence
collector has to be very quick to make a successful detection. But once the
collection is made, the differing amounts of each isotope remaining help
establish the length of time since the detonation. For example, the ratio of the
9
determine the device’s yield and whether the device used plutonium or uranium.
Radioactivity releases from tests can be detected in two ways: by specially
equipped aircraft (as noted above) or by ground stations operated by the
International Monitoring System (IMS). The role of the IMS in seismic and
11
acoustic sensing was discussed in Chapter 14. The IMS also has a radionuclide
monitoring network that is primarily directed at monitoring atmospheric nuclear
explosions.
On-Site Nuclear Sampling. While much information about nuclear material is
available from sensing, some signature details can only be obtained from a
physical sample. These detailed signatures allow researchers to identify the
processes used to initially create a material and may allow identification of the
source of the material—a critical issue in the field of intelligence. The shape
12
and size of uranium particles, for example, provide clues about the origin of the
material. The amount of radiation emitted from a given sample can sometimes
be used to tell when the material was produced.
With the current moratorium on nuclear testing, intelligence collection has
shifted away from air sampling and moved to on-site sampling, aimed at
verifying the safety of nuclear warheads, detecting signs of nuclear proliferation,
and thwarting illicit trafficking of nuclear materials. The collection of samples
13
Soil sampling can detect CW agents, even over a long term. Either the agent
or its degradation products will persist. Soil samples taken from a Kurdish
village in northern Iraq were analyzed and found to contain degradation products
of sarin and mustard gas more than four years after the Iraqi government
bombed the village in 1988. Much of this soil and debris sampling is done by
16
• Material samples provided the first firm evidence that the Soviets were
using titanium for the hulls of their submarines. Titanium construction
represented a major advance in submarine design because it could enable
submarines to operate at greater depths. The first clues came from ground level
and satellite photographs of hull sections at a Leningrad shipyard: The hull
sections were too highly reflective to be steel, and they showed no signs of
oxidation, as steel would. Prompted by the clues, an assistant U.S. Navy attaché
was able in 1969 to obtain a sample of metal from the shipyard that proved to be
a scrap of titanium, providing confirmation of the Soviet development.19
The detection range of the MAD sensor can also be affected by the
operation of the aircraft that carries it. Electric motors and other electronics can
produce so much aircraft RF interference that the submarine’s magnetic
signature is lost in the noise. MAD aircraft rely on special electronics to
compensate for and eliminate this aircraft noise. Also, the MAD is placed as far
as possible from the interfering sources. The result is that a MAD aircraft has a
distinct tail extension, called the MAD boom. Figure 15.1 shows a P-3 Orion
aircraft with its MAD boom.
MAD devices also can be used in a battlefield environment to detect
concealed metallic objects—armored vehicles or artillery hidden under a forest
canopy, for example.
Nuclear Material Samples. In the case of nuclear material samples, screening for
radioactive isotopes uses a technique called gamma spectrometry. Gamma
spectrometry relies on the fact that most radioactive substances emit gamma
rays, and the energy and count rate of gamma rays emitted provide information
on the isotopes in the sample. For example, the radiation emitted by nuclear
material can reveal its age (that is, the time since it was first processed). As
radioactive elements decay, they produce radioactive isotopes that, in turn,
produce other isotopes. A spectrometer can determine the ratios of all the
isotopes in this mix and then use these ratios to establish how much time the
original material has spent decaying.
Gamma spectrometry is capable of detecting as little as one microgram of
uranium and often can estimate its level of enrichment. A number of other
20
methods also are used to obtain details about radioactive isotopes, including
electron microscopy and X-ray diffraction. Following is an example of the
processing of nuclear attack debris.
In the first type of attack, forensics may be able to identify the nation that
originated the fissile material or weapon and determine whether terrorists had
fabricated the weapon on their own or obtained it from a nation’s stockpile. In a
21
dirty bomb attack, forensics probably can identify the source of the radioactive
material used. Nuclear forensics can do this because of the widespread practice
of fingerprinting nuclear and radiological material to prevent the illegal
smuggling and trafficking of materials that have potential for use in nuclear
terrorism. In all cases, it is important to conduct prompt sampling of the debris
from the attack and to process and exploit the samples quickly.
Processing and exploitation of the radioactive debris can provide a number
of insights that would help to identify the perpetrators of an attack. In the case of
a nuclear bomb detonation, the first question would be whether the weapon was
based on highly enriched uranium or plutonium. That question can be answered
fairly quickly. Within hours to weeks, the investigators would determine key
details about the original nuclear material and then estimate the size, weight, and
complexity of the bomb. For example:
By comparing isotopic data from the debris with similar data from
plutonium or highly enriched uranium stockpiles or weapons, it is possible to
conclude whether some of the fissile material comes from a specific arsenal. It
also is possible, with sufficient time and access to actual weapons designs, to
determine whether a particular type of weapon has been employed. 22
MAD Processing. MAD processing must deal with extracting a very weak
anomaly signal in the presence of noise and interference. False alarms inevitably
increase as the sensitivity of the MAD device is increased.
DISSEMINATION
Structure
Like many other boutique collection efforts, materials sampling is a structurally
diverse enterprise. Naval, law enforcement, and ground force units all do
magnetic field sensing for their specialized purposes. Nuclear material sampling
and chemical sampling are done by military, intelligence, and law enforcement
units and by international treaty monitoring organizations. Monitoring the
chemical weapons convention, for example, is a responsibility of an international
body, the Organisation for the Prohibition of Chemical Weapons. Monitoring to
detect illicit movement of chemical or nuclear material usually is handled at
border checkpoints by customs officials.
Summary
Materials intelligence makes use of two collection techniques—materials
sensing and materials sampling.
Materials sensing relies on devices to sense chemical or physical changes in
the environment immediately surrounding the sensor. These sensors measure
phenomena within an object or at short ranges and typically detect contaminants,
nuclear radiation, or magnetic fields.
Materials sampling involves acquiring small quantities or traces of a
material and using forensic processes to determine its nature. So materials
sampling includes the collection and analysis of trace elements, particulates,
effluents, and debris. Such materials are released into the atmosphere, water, or
earth by a wide range of industrial processes, tests, and military activities.
Three general types of materials are of intelligence interest and are the
focus of sensing and sampling efforts: nuclear material, certain chemicals, and
magnetic material.
• obtaining debris samples after a nuclear attack for the purpose of identifying
the origin of the device used.
All nuclear reactions result in the emission of particles and waves— gamma
rays, x-rays, neutrons, electrons, or ions. The radiation is strongest from a
surface or atmospheric nuclear detonation, but nuclear power reactors also emit.
The strength and type of radiation allows one to characterize the emitter. Nuclear
explosive devices can be identified by the presence of the fissionable isotopes
uranium-235, plutonium-239, and uranium-233.
In most cases, nuclear radiation detectors are effective only if they are
relatively close to the source. They encounter a problem that is common to many
types of sensors: The sensor can be made extremely sensitive to allow detection
at longer ranges, but the number of false alarms then rises dramatically.
Chemical sampling and sensing have become much more important due to the
growing worldwide threat of chemical terrorism. Spectral sensing can detect
many chemicals at a distance and is especially effective against gaseous
effluents. Chemical production processes generate and release telltale chemical
signatures that can provide information about the activities taking place within a
facility. Sensors are widely used to detect and identify chemicals upon contact.
Materials sampling is used to identify the processes and products of a
facility and in any location where there is reason to suspect chemical warfare
agents have been produced or used.
NOTES
1. Sir Arthur Conan Doyle, “A Study in Scarlet,” The Complete Sherlock Holmes (New York: Doubleday, 1985), 33.
2. Vitaly Fedchenko, “Weapons of Mass Analysis—Advances in Nuclear Forensics,” Jane’s Intelligence Review, (November 1, 2007).
3. Jack Allentuck and James R. Lemley, “Open Skies and Monitoring a Fissile Materials Cut-off Treaty,” Brookhaven National Laboratory Report No. BNL-61355 (July 9, 1965).
4. Steven Johnson, “Stopping Loose Nukes,” Wired, (2004), accessed 23 September 2012 at www.wired.com/wired/archive/10.11/nukes_pr.html.
5. Eric Lipton, “U.S. Security Devices at Ports to Be Replaced,” International Herald Tribune, (Monday, May 9, 2005), accessed 23 September 2012 at
http://www.nytimes.com/2005/05/08/world/americas/08iht-secure.html.
6. Luis W. Alvarez, Alvarez: Adventures of a Physicist, (New York: Basic Books, 1987), 120.
7. National Research Council of the National Academies of Sciences, “The Comprehensive Nuclear Test Ban Treaty: Technical Issues for the United States” (Washington, DC: National
Academies Press, 2012), 2, accessed 23 September 2012 at http://www.nap.edu/catalog.php?record_id=12849.
8. National Academy of Sciences, “Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty” (Washington, DC: National Academies Press, 2002), 45.
9. Ibid.
10. Richard L. Garwin and Frank N. von Hippel, “A Technical Analysis: Deconstructing North Korea’s October 9 Nuclear Test,” Arms Control Today (November 2006), accessed 23
September 2012 at www.armscontrol.org/act/2006_11/tech.
11. National Radiation Laboratory of New Zealand, “CTBT International Monitoring,” accessed 23 September 2012 at www.nrl.moh.govt.nz/about/ctbtinternationalmonitoringsystem.pdf.
12. “Identifying the Source of Stolen Nuclear Materials,” Science and Technology Review, Lawrence Livermore National Laboratory (January/February 2007), 13–18.
13. Jonathan Medalia, “Nuclear Terrorism: A Brief Review of Threats and Responses,” CRS Report to Congress (February 10, 2005).
14. “Sensing Danger: Researchers Develop New Sensing Technologies to Improve Response to Chemical and Biological Attacks,” Research Horizons Magazine, (November 23, 2004),
accessed 23 September 2012 at http://gtresearchnews.gatech.edu/newsrelease/danger.htm.
15. U.S. Congress, Technologies Underlying Weapons of Mass Destruction, OTA-BfPISC-115 (Washington, DC: U.S. Government Printing Office, December 1993), 48.
16. Ibid, 62.
17. “U.S.: Sudan Plant Sample Contains VX Nerve Gas Precursor,” CNN.com, (August 24, 1998), accessed 23 September 2012 at www.cnn.com/WORLD/africa/9808/24/bomb.damage/.
18. Gus W. Weiss, “The Farewell Dossier,” CIA Center for the Studies of Intelligence, accessed 23 September 2012 at www.cia.gov/library/center-for-the-study-ofintelligence/csi-
publications/csi-studies/studies/96unclass/farewell.htm.
19. Norman Polmar and Kenneth J. Moore, Cold War Submarines (Dulles, VA: Brassey’s, 2004), 143.
20. Ibid.
21. Medalia, “Nuclear Terrorism.”
22. William Donlop and Harold Smith, “Who Did It? Using International Forensics to Detect and Deter Nuclear Terrorism,” Arms Control Today (October 2006), accessed 23 September
2012 at www.armscontrol.org/act/2006_10/CVRForensics.
23. Lawrence Livermore National Laboratory, “Identifying the Source of Stolen Nuclear Materials,” Science and Technology Review (January/February 2007).
16. Biological, Medical, and Biometric
Intelligence
The intelligence collection discussed in this chapter has two major purposes:
Function
As was the case with chemical sensors in Chapter 15, biological sensors (often
called biosensors) have become more important as a result of the growing threat
of biological terrorism. Biological sampling and biosensors can provide warning
of disease outbreaks. They can identify specific pathogens such as anthrax or
smallpox. When malign biological agents are detected, the goal is to quickly and
accurately trace their origin in order to determine if they are endemic to a
particular region or who may have intentionally introduced them.
The National Center for Medical Intelligence (NCMI) has a long history of
assessing the threats from outbreaks of diseases such as the H5N1 avian
influenza. Intelligence collection and analysis in this field are necessary because
some countries fail to report infectious diseases or even provide false
information about them. China, in particular, has a history of hiding information
about disease outbreaks. The Chinese government took great care to conceal
information about the outbreak of Severe Acute Respiratory Syndrome in 2003. 1
• to identify the microorganisms that cause disease and tracing the source of
disease outbreaks, and
Both medical sampling and sensing are used to assess the mental and
physical health of world leaders. These leaders value their public image, and the
perception that a leader’s health is failing can diminish his or her effectiveness.
So leaders tend to protect their health information, and the job of intelligence is
to pierce that veil of secrecy. A foreign government derives a political and
diplomatic advantage by learning the true condition of an ailing leader. Knowing
that a leader doesn’t have much time left can be critical to another government
for timing and influencing actions about possible successors, for example. And
leaders having a terminal illness are prone to make impulsive decisions that can
have lasting political consequences. Dr. Jerrold Post founded CIA’s Center for
the Analysis of Personality and Political Behavior. While at CIA, he prepared
psychological profiles on a number of world leaders, including Israeli Prime
Minister Menachem Begin. Dr. Post commented that two decisions Begin made
on his deathbed—designation of Jerusalem as Israel’s eternal capital and
applying Israeli law to the Golan Heights—have complicated Middle East peace
negotiations ever since.5
Process
PLANNING
COLLECTION
Biological Sensing and Sampling. Biological sensing and sampling are
conducted by medical and veterinary facilities worldwide for reasons of public
health and to monitor disease outbreaks among crops and farm animals. Samples
taken from humans, animals, and plants are used routinely to identify diseases.
The United Nations’ World Health Organization and the U.S. Centers for Disease
Control and Prevention, for example, do extensive medical sampling. This
collection is not done for intelligence purposes, but it provides the essential
background for the more selective targeting done by intelligence agencies.
As an example of such targeting, intelligence collection is done to obtain
indications of biological warfare agent production, and such collection may have
to be done clandestinely. Sampling is most commonly done, because sensing of
biological agents doesn’t provide the desired level of detail about the production
process.
Remote sensing of biological agents depends on the existence of a signature
that can be remotely sensed, and for most agents no such signature exists.
Biological agents are usually colorless and odorless. A number of biological
detectors exist that can immediately indicate the presence of a biological agent
by capturing samples, but the samples must be collected, taken to a lab, and then
cultured to identify the pathogen. The whole process can take several hours.
Sensors that can quickly detect and possibly identify biological agents on
contact are being tested. And though biological agents are more difficult to
detect than chemical agents, the same sensor can sometimes be used to detect
attacks for both. The integrated optics sensor for chemical agent detection
described in Chapter 15 has been used to detect biological agents. The device
measures the reaction of an agent with chemicals on the optical waveguide
surface. A different design approach senses the rapid reaction of certain human
cells to the presence of diseases such as anthrax, plague, and smallpox. Frequent
8
false alarms have been a problem for most biosensors, as noted earlier in the
Gulf War sampling effort, but that is likely to change as the designs improve.
Case Study: The bin Laden Hunt. One of the more controversial instances of
medical sampling for intelligence purposes was a part of the hunt for Osama bin
Laden. A Pakistani doctor, Shakil Afridi, was hired to set up a vaccination
program in the region around Abbottabad. The real purpose of the program was
to collect blood samples from children in the compound suspected of concealing
bin Laden. DNA testing would then determine if they were bin Laden’s children.
Whether the sampling program was a success has not been revealed. But Dr.
Afridi was considered a traitor by the Pakistanis. He was arrested, tried,
convicted on a charge of having links to a banned militant group, and
imprisoned. 10
mycotoxins in their sample analysis. The United Nations found the evidence to
be inconclusive, and an alternative hypothesis emerged, suggesting that the
“yellow rain” was actually just a naturally occurring phenomenon of a swarm of
Asian honeybees defecating in flight. The United States continued its
13
Iris scans analyze the features that exist in the colored tissue surrounding
the pupil. The iris is unique; no two irises are alike, even among identical twins,
in the entire human population. In the iris alone, there are more than 400
distinguishing characteristics that can be quantified and used to identify an
individual. Approximately 260 of those are currently captured and used in iris
identification.
Retinal and iris scans can capture their respective signatures at a distance of
up to 1 meter. This makes them useful at checkpoints but generally not usable in
area surveillance.
Biometric facial recognition is probably the most rapidly growing area of
biometrics. It has the substantial advantage of being done at a distance,
unobtrusively. Facial recognition uses camera images, measuring distances and
angles between points on the face—mouth extremities, nostrils, eye corners—to
create a faceprint that can be recognized in scanning a crowd of people.
Biometric facial recognition currently is being used to control access to facilities,
as well as to computers and gaming casinos, and at border crossing points
around the world. 17
Hand geometry uses the geometric shape of the hand for authenticating a
user’s identity. But unlike fingerprints, the human hand is not unique until
observations get down to fine detail. One can use finger length, thickness, and
curvature for the purposes of verification (confirming that a person is who he
says he is), but this is not suitable for identification (as one cannot reliably
search for a handprint in a database; there are too many likely matches).
Keystroke dynamics relies on measuring the unique ways a person enters
information using a keyboard. As a biometric recognition technique, it has an
antecedent that is more than a century old. As noted in Chapter 4, Morse code
operators have long been able to recognize other operators by their characteristic
pattern of keying the code, known as their “fist.”
Scent identification is based on the ability to identify a unique signature
based on scent in much the same way that dogs can distinguish the scents of
specific humans and other dogs. This identification is accomplished by a
technique called chromatography, which measures the relative proportions of
chemicals in a gas. Researchers also are investigating the possible use of human
scent to detect deception.18
Behavioral Sensing. Terrorists are often trained to conceal emotions, but some
reactions of the human body are not subject to voluntary control. Skin
temperature, blood-flow patterns, perspiration, and heart and breathing rates are
difficult or impossible to control; the polygraph relies on these. New
technologies are being developed to sense these signatures at a distance. The
U.S. Department of Homeland Security (DHS) is reportedly developing an
automated sensing system to detect hostile intent; the system would rely on an
array of sensors to measure these signatures at a distance of approximately 2
meters.22
Biological and Medical Samples. Biological and medical samples are both
processed in much the same way—in medical laboratories, using tools and
methodologies that are widely used within the medical profession. Processing of
sensing data such as videos of world leaders is typically done by a medical
expert or psychiatrist.
DISSEMINATION
Structure
Biological and medical sampling have fairly well-established structures; they’ve
been done for years both within and outside of intelligence organizations.
Medical sampling is performed by a number of governmental, commercial, and
nongovernmental organizations. Internationally, the UN’s WHO monitors
disease outbreaks and has its own medical sampling effort. Very few countries
maintain intelligence organizations that have a specific mission of medical
sampling. In the United States, one such organization exists: the NCMI, located
at Fort Detrick, Maryland. NCMI, formerly the Armed Forces Medical
Intelligence Center (AFMIC), has a long history of providing medical
intelligence. NCMI also handles biological warfare agent intelligence, supported
by U.S. Army sampling teams in combat theaters.
Psychological assessments also have a well-established structure. CIA
reportedly has a collection and analysis unit that provides such profiles. Some
universities also have political departments that conduct psychological
assessments.26
Summary
Biological and medical sampling and biometric sensing and sampling all require
intrusive collection that is targeted on humans. Because the collection is done
internationally and the results are shared with other countries, it raises civil
rights and identity protection issues.
Biological collection has become much more prominent as a result of the
growing worldwide threat of biological terrorism. Biological signatures are
needed to identify the microorganisms that cause disease, for tracing the source
of disease outbreaks, and to identify biological warfare agent manufacture or
use. Most collection is done by sampling. Diagnostic sampling is performed in
medical and veterinary facilities worldwide. Samples taken from humans,
animals, and plants are used routinely to identify diseases. But biosensors are
finding increasing use because they can identify specific pathogens such as
anthrax and smallpox. When biological agents are detected, the goal is to quickly
and accurately trace their origin in order to determine if they are endemic to a
particular region and who may have intentionally introduced them.
Medical intelligence sampling is closely related to biological sampling, but
the focus is on individuals rather than on detecting and identifying diseases.
Medical sampling is used to identify exposure to chemical warfare agents. Both
medical sampling and sensing are used to assess the mental and physical health
of world leaders.
Biometrics is a separate discipline for obtaining and analyzing signatures
about humans. It uses automated methods for recognizing an individual based on
physical or behavioral characteristics. Specialized sensors can capture a number
of physical characteristics to create biometric signatures, including fingerprints,
facial characteristics, iris or retinal patterns, hand geometry, voice features, and
keystroke dynamics.
Behavioral sensing and assessment is closely related to biometrics and is
often combined with biometric sensing. It is more than signatures; it is the study
of patterns of behavior. Behavioral sensing is used not to identify a specific
named individual but to identify a potential perpetrator.
NOTES
1. Ellen Bork, “China’s SARS Problem, and Ours,” The Daily Standard, (April 4, 2003), accessed 24 September 2012 at
www.weeklystandard.com/Content/Public/Articles/000/000/002/504jlpnl.asp.
2. “New Details on F.B.I.’s False Start in Anthrax Case,” New York Times, (November 25, 2008), A23.
3. DoD, “Close-out Report, Biological Warfare Investigation” (February 13, 2001), accessed 7 April 2013 at http://www.gulflink.osd.mil/bw_ii/index.html.
4. U.S. Congress, Technologies Underlying Weapons of Mass Destruction, OTA-BfPISC-115 (Washington, DC: U.S. Government Printing Office, December 1993), 53.
5. Gary Thomas, “Spies Track Physical Illnesses of Foreign Leaders,” VOA News, (September 19, 2011), accessed 3 September 2012 at www.voanews.com/content/article/171599.html.
6. DoD newsletter, “The Biometric Scan” (January 2008), accessed 9 September 2012 at http://www.biometrics.dod.mil/newsletter/issues/2008/Jan/v4issue1_a4.html.
7. Jonathan Lis, “Will Biometric Passports Limit the Reach of Israel’s Intelligence?” Haaretz (February 19, 2010), accessed 28 July 2012 at http://www.haaretz.com/print-edition/news/will-
biometric-passports-limit-the-reach-of-israel-s-intelligence-1.263599.
8. “Bio-sensor Quickly Detects Anthrax, Smallpox and Other Pathogens,” Science Daily, (March 7, 2008), accessed 9 September 2012 at
http://www.sciencedaily.com/releases/2008/03/080304120746.htm.
9. Gary Thomas, “Spies Track Physical Illnesses of Foreign Leaders” (September 20, 2011), Voice of America, accessed 21 September 2012 at
http://www.voanews.com/english/news/usa/Spies-Track-Physical-Illnesses-of-Foreign-Leaders130222673.html.
10. BBC News Asia, “Profile: Shakil Afridi” (September 11, 2012), accessed 17 September 2012 at http://www.bbc.co.uk/news/world-asia-18182990.
11. Saeed Shah, “Aid Groups Protest to CIA over bin Laden Scheme,” Miami Herald, (March 3, 2012), accessed 17 September 2012 at
http://www.miamiherald.com/2012/03/02/2672173/aid-groups-protest-to-cia-over.html.
12. Merle Pribbenow, “‘Yellow Rain’: Lessons from an Earlier WMD Controversy,” International Journal of Intelligence and Counterintelligence, Vol. 19 (2006), 737–745.
13. U.S. Department of State, “Case Study: Yellow Rain,” accessed 24 September 2012 at http://2001-2009.state.gov/t/vci/rls/prsrl/57321.htm.
14. NIC Assessment: SARS: Down but Still a Threat, ICA 2003-09 (August 2003), accessed 24 September 2012 at www.fas.org/irp/nic/sars.pdf.
15. Benedict Carey, “Teasing Out Policy Insight from a Character Profile,” New York Times, (March 28, 2011), accessed 20 September 2012 at
http://www.nytimes.com/2011/03/29/science/29psych.html.
16. Tiffany L. Vogel, “Security: Biometric Style,” International Federation for Protection Officers (April 25, 2003), accessed 24 September 2012 at
www.ifpo.org/articlebank/biometrics.html.
17. John D. Woodward Jr., “Super Bowl Surveillance: Facing Up to Biometrics,” in Intelligencer: Journal of U.S. Intelligence Studies (Summer 2001), 37.
18. Shaun Waterman, “DHS Wants to Use Human Body Odor as Biometric Identifier, Clue to Deception,” UPI.com (March 9, 2009), accessed 24 September 2012 at
www.upi.com/Emerging_Threats/2009/03/09/DHS_wants_to_use_human_body_odor_as_biometric_identifier_clue_to_deception/UPI-20121236627329/.
19. Biometrics Task Force, “HIIDE Gets an Update,” accessed 28 September 2012 at http://www.biometrics.dod.mil/Newsletter/issues/2008/Oct/v4issue4_pm.html.
20. Defense Systems, “Biometrics Now Way of Life in Afghanistan” (July 11, 2012), accessed 17 September 2012 at http://defensesystems.com/articles/2012/07/11/agg-biometrics-
afghanistan.aspx.
21. Public domain image, accessed 28 September 2012 at http://warrior-police.blogspot.com/2010/05/hiide-seek-modern-army-style.html.
22. “If Looks Could Kill,” Economist.com, (October 23, 2008), accessed 24 September 2012 at www.economist.com/science/displayStory.cfm?source=hptextfeature&story_id=12465303.
23. Ibid.
24. “Technology Would Help Detect Terrorists Before They Strike,” Science Daily, (October 10, 2007), accessed 24 September 2012 at
www.sciencedaily.com/releases/2007/10/071005185129.htm.
25. Benedict Carey, “Teasing Out Policy Insight from a Character Profile,” New York Times, (March 28, 2011), accessed 20 September 2012 at
http://www.nytimes.com/2011/03/29/science/29psych.html.
26. Ibid.
17. Materiel Acquisition and
Exploitation
This chapter discusses a specialized field of technical collection that does not fit
cleanly into any of the previous chapters but that contributes significantly in the
areas of treaty monitoring, military operations and law enforcement. Materiel
acquisition and testing is not to be confused with materials sampling that was
discussed in Chapter 15—though each usually involves the help of a human
intelligence (HUMINT) operation.
Materiel acquisition specifically refers to acquiring hardware (to include
large items such as airplanes, missiles, or ships and small items such as
integrated circuit chips or cell phones and computer chips).
Function
Materiel acquisition and exploitation have a long history in the military arena.
The Hittites of Asia Minor in about 2000 BCE may have been the first targets of
materiel acquisition efforts, as their iron weaponry was acquired and reverse
engineered by the bronze-using Egyptians. The Hittites were far from the last
1
Process
The process for materiel acquisition is shown in Figure 17.1. It differs from that
described in the preceding chapters on nonliteral collection. There is usually no
processing and no signature library. You proceed directly from collection
(acquisition) to exploitation. The dissemination phase may result in a database of
exploitation reports, but that does not serve the same function as a signature
library.
PLANNING
Often a military item may be known to exist, and intelligence questions about it
need to be answered. The organization that needs the information will generate a
requirement for collecting and exploiting the item. An example of such a
requirement might be to identify or verify suspected external modifications to an
enemy’s main battle tank. The result would be a target folder that describes the
item of interest, preferably with a photograph or sketch and possible acquisition
sources or locations. The folder would also include exploitation and reporting
instructions.
3
FIGURE 17.1 The Materiel Acquisition Structure and Process
ACQUISITION (COLLECTION)
Enduring Freedom, the JCMEC again was active in acquiring foreign materiel.
The JCMEC recovered foreign materiel in Afghanistan estimated to be worth
$40 million and shipped the materiel back to the United States for detailed
exploitation.
5
Overt Acquisition Example: The Bruneval Raid. In the fall of 1941, Britain’s
scientific intelligence officer, Dr. R. V. Jones, was zeroing in on a new German
antiaircraft fire control radar that was believed to transmit on a frequency of 570
MHz. One of the more daring British reconnaissance pilots brought back a
picture of a new radar located near Bruneval, France. The British realized that
this radar was located less than 200 yards from the coast and quickly organized a
commando raid to obtain detailed information about it.
The British assembled a company of paratroops to make an airborne
assault. A naval assault was too risky because of the high cliffs around Bruneval,
but a light naval force was assembled to handle the evacuation. Dr. Jones,
meanwhile, had identified the German radar by name—Würzburg— but he still
could not confirm that the radar was the source of the 570-MHz signals.
Jones specified in detail the parts he wanted his acquisition team—members
of the Corps of Royal Engineers and a radar mechanic—to bring back. Of
special interest were the feed antenna for the radar dish, which would establish
the operating frequency of the radar, and the receiver and display equipment,
which would reveal whether any antijamming circuits existed. He also asked for
the transmitters because they would reveal the German technology for
generating 570-MHz signals. Two radar operators were to be taken prisoner, if
possible, so that they could be interrogated about radar operation. Finally, if
equipment could not be removed, the labels and inspection stamps were to be
taken because these would provide valuable background information.
On the night of February 27, 1942, the raid, codenamed Operation BITING,
took place. Despite the errors and missed assignments that are inevitable in such
an adventure, the raid was an unqualified success. The Bruneval force brought
back exactly what Jones had asked for, except that only one radar operator was
captured.7
The Bruneval Raid succeeded because the British knew exactly what they
wanted to get. The acquisition team had an expert analyst in the loop at every
step. Most successes in materiel acquisition since that time have involved
carefully focused teams closely tied to analytical expertise. Most failures have
resulted in cases where the collectors, compartmented from the analysts, had no
real idea what they were trying to get or why.
Clandestine Acquisition. Though the Bruneval Raid was a victory, there is
always an obvious drawback of a seizure that results from combat or special
operations, like that of the Würzburg. The opponent knows about the operation’s
success and can take countermeasures to reduce the value of information gained.
Given the choice, clandestine acquisition is the preferred collection technique.
The gold standard is when the opponent is unaware of the effort altogether.
Clandestine materiel acquisition by governmental intelligence agencies is
often by purchase, usually through middlemen to conceal the intended
destination. In their heyday, the Soviets were very good at such clandestine
materiel acquisition. They acquired a great deal of materiel for reverse
engineering of both military and civilian products. On one occasion, they
managed to acquire a new IBM computer before it was officially on the market.
However, the result must have been less than satisfactory for the Soviets because
none of the IBM sales or maintenance people they subsequently contacted knew
how to make it work.
As previously noted, acquisition of military equipment often is a result of a
successful HUMINT operation, as the acquisition is usually a clandestine effort.
There are good reasons for making it clandestine. First, one wishes to protect
sources and methods. Second, as we have already emphasized, the intelligence
that is gained has less value if the opponent is aware of the acquisition. Both
motivations are illustrated in the case of probably the most expensive clandestine
materiel acquisition effort ever undertaken by the United States—the Glomar
Explorer.
EXPLOITATION
The previous examples have focused on materiel acquisition. But once the
materiel has been acquired, it must be exploited for its intelligence value. This
usually is done by experts who are familiar with how the type of product is built.
If collection has been done clandestinely (and sometimes when collection has
been done by capturing the equipment), then the exploitation also should be
concealed.
Exploitation often begins in the field, in the case of captured equipment.
This initial and usually quick exploitation phase determines whether the
opposing forces are really employing the equipment and whether further
exploitation is necessary. If it is, the equipment may be sent to a field center for
exploitation. The United States relies on Captured Materiel Exploitation Centers
for such tactical intelligence exploitation. High-interest equipment may then be
evacuated to the Scientific and Technical Intelligence centers maintained by
individual U.S. services for detailed exploitation.
9
Wherever the work is done, and with whatever tools or methods are
available, there are standard goals for exploitation. Depending on whether the
materiel can be brought to your territory, or you find a way to borrow it, or in the
worst case, you are not able to physically touch it, there are a number of
available exploitation methods. Three of them—product teardown, performance
testing, and factory markings—are discussed here.
U.S. experts knew they would have to return the plane eventually. They
took it apart piece by piece. The Foxbat was disassembled and the engine, radar,
computer, automatic pilot, fire control, electronic countermeasure, hydraulic,
communications, and other systems were put on blocks and stands for
mechanical, electronic, metallurgical, and photographic analysis.
The exploitation of the MiG-25 uncovered a series of surprises. In sum, the
Foxbat was substantially less than the spectacular Soviet accomplishment
described in intelligence estimates. It could function well as an interceptor
against bombers, but it would perform poorly against U.S. fighters. It was a fuel
hog, having fairly primitive avionics. The airplane had, in fact, been built for one
specific mission—to intercept and shoot down the B-70 (which never went into
production). Its resulting limitations included these:
• The massive turbojets could propel the aircraft to Mach 3, but it could barely
maneuver at that speed.
• The pilot’s visibility was severely limited; the pilots could basically see only
what was directly in front of them.
• The avionics used vacuum tubes, at a time when U.S. combat aircraft relied
on solid-state electronics.
• Advanced materials, such as titanium, were used sparingly and only where
essential—nickel-steel alloy was used wherever possible. 11
While the Americans and Japanese methodically took apart the MiG-25 and
continued their exploitation and debriefing of Belenko, the Soviets were
demanding the immediate return of the aircraft and pilot. The Japanese
responded by noting that the aircraft had violated Japanese airspace; the issue,
therefore, was complicated. There were precedents for returning the plane and
precedents for keeping it. For the time being, the Japanese retained the aircraft as
evidence while their investigation of the matter was ongoing. Material evidence
12
in a crime such as this plainly deserved the most careful going-over, perhaps
even by experts from several countries. It was possible, after all, that the pilot
was carrying contraband into the country. The aircraft would have to be searched
in detail. When the Soviets demanded to be allowed to fly the plane out of Japan,
the Japanese replied that this was impossible. A crime had been committed by
the plane’s intrusion into Japanese airspace. The Japanese government could not
allow a repeat violation by permitting the plane to fly out. The Foxbat would
have to be transported out by ship, in crates.
The Soviets escalated from protests and pleas to threats and actions. Soviet
naval vessels began seizing Japanese fishing vessels and imprisoning their
crews. These actions, along with other threats and the condescending Soviet
attitude, had the opposite effect from what the Soviets intended. It infuriated the
Japanese public and provoked the Japanese government into a defiant posture. In
a formal note rejecting the Soviet protests and charges, the Japanese government
expressed surprise that the Soviet Union had not apologized for violating
Japanese airspace. As for all the Soviet demands that the MiG-25 be given back,
a foreign ministry official said, “The Soviet Union should first explain what it
thinks of the incident. It is no way for anyone to try to take back something he
has thrown, even though inadvertently, into the yard of his neighbor.”13
On November 12, 1976, more than two months after Belenko landed the
Foxbat, the Soviets got it back—in pieces. Eight Japanese trucks delivered the
crated parts to a Japanese port, where a Soviet freighter waited with a crew
supplemented by technicians and KGB officers. The freighter remained in the
port until the Russians inventoried all the parts.
14
Since actual performance testing of the MiG-25 was off the table,
investigators turned to another INT: HUMINT, specifically defector debriefing.
Much performance information came from debriefings of Lieutenant Belenko.
The combination of the debriefing information with the exploitation results
provided a more complete picture of the aircraft’s design and performance. For
example, Belenko reported the following:
• The combat radius of the aircraft was at most 300 kilometers (186
miles)—by Western standards, an incredibly short range.
• In maneuvers, the aircraft could not take more than 2.2 Gs with full
tanks—with more, the wings would rip off. Even with nearly empty tanks, 5 Gs
was the turn limit. The Foxbat was clearly not designed to dogfight; it could not
match the older U.S. F-4 Phantom in a turn.
• Top speed was theoretically Mach 2.8, well below the original speed
goal of Mach 3.2. However, the pilots were forbidden to exceed Mach 2.5. At
high speeds the engines tended to accelerate out of control; above Mach 2.8, the
engines would overheat and burn up. Anytime the aircraft was flown near Mach
2.8, the engines were ruined and had to be replaced.16
The practice has continued in every war since then and during peacetime as
well. The following example illustrates the acquisition and use of factory
markings.
After the exhibition closed at its first stop on the tour, a team of specialists
clandestinely gained access to the Lunik for 24 hours. They found that it
was, indeed, a production item from which the engine and most electrical
and electronic components had been removed. They examined it thoroughly
from the viewpoint of probable performance, taking measurements,
determining its structural characteristics and wiring format, and estimating
engine size. The team then recommended a more detailed exploitation.
The Lunik crate arrived soon afterward and was delivered to the exhibition.
The specialists that were brought in for the detailed exploitation came from
a factory markings team, whose expertise was in exploiting factory-
produced items and identifying their production source. On the basis of
their experience at trade fairs and other exhibitions, the team preferred
access to the item before the opening of an exhibition to examining it while
in the exhibition hall or after it had left the grounds for another destination.
The physical situation at the grounds, however, ruled out access to it prior
to the show’s opening. During the show, the Soviets provided their own 24-
hour guard for the displays, so there was no possibility of making a
surreptitious night visit.
This left only one chance: to get to the Lunik at some point after it left the
exhibition grounds. After the exhibition, the displays would be carried by
truck from the exhibition grounds to a railroad station and then loaded onto
freight cars for their next destination.
It was arranged for the Lunik to be the last truckload of the day to leave the
grounds. When it left, it was preceded by a CIA station car and followed by
another; their assignment was to determine whether the Soviets were
escorting it to the rail yard. When it was clear that there were no Soviets
around, the truck was stopped at the last possible turnoff, a canvas was
thrown over the crate, and a new driver took over. The local driver was
escorted to a hotel room and kept there for the night.
Half the team then climbed into the front-nose end of the Lunik with a set
of photographic equipment and a drop light. They removed one of the
inspection windows in the nose section, took off their shoes so as to leave
no telltale scars on the metal surface, and squeezed inside. They then
photographed or hand-copied all markings and components. The other half
of the team did the same in the aft engine compartment.
At 5:00 a.m., a driver came and moved the truck to a prearranged point.
Here the canvas cover was removed and the original driver took over and
drove to the rail yard. The Soviet who had been checking items as they
arrived the previous day came to the yard at 7:00 a.m. and found the truck
with the Lunik awaiting him. He showed no surprise, checked the crate in,
and watched it being loaded onto a flatcar.19
Reverse Engineering the B-29. At first glance, reverse engineering would seem
to be a productive way to make use of an acquired hardware, where it is more
advanced than what your factories can build. After all, it is usually faster to
produce a copy of a product than beginning from scratch. The following
example illustrates the principle but also illustrates the major drawback of
reverse engineering.
During 1944, three B-29s made emergency landings in Soviet territory after
bombing raids on Japan and Japanese-occupied China. The Soviets were neutral
with respect to Japan until almost the end of the war. So the bombers were
interned and kept by the Soviets, despite American demands for their return.
Stalin gave aircraft designer Andrei Tupolev the job of reverse engineering the
aircraft. The interned B-29s were flown to Moscow and delivered to the Tupolev
design bureau. One B-29 was fully dismantled, down to the rivets. Another was
used for flight tests and training. A third aircraft was left intact as a standard.
Tupolev produced 20 copies of the aircraft, which he named the TU-4, in just
two years. Figure 17.2 shows a comparison of the two aircraft.
20
The Tupolev story illustrates both the pluses and minuses of reverse
engineering. The advantage is that you can produce a copy of the product much
faster than if you had to start from scratch. The disadvantage is that you are
perpetually in a catch-up position. In the case of the TU-4, by the time it was
flying, it was obsolete; the United States by then was well along in building its
first jet-powered strategic bomber, the B-47.
FIGURE 17.2 Reverse Engineering the B-29
DISSEMINATION
Structure
This is the best example of a boutique INT. It is highly targeted, going after
specific items for a specific purpose.
Clandestine acquisition is typically handled by a clandestine service, often
by purchasing the materiel through middlemen. One of the best known examples
is the KGB’s Line X, which was very successful at acquiring Western
technology until its operations were exposed by Colonel Vladimir Vetrov.
Military organizations are set up to acquire and exploit captured military
equipment. In the United States, this responsibility is handled by DIA under the
Department of Defense (DoD) Foreign Materiel Acquisitions and Exploitation
Program. Service components typically handle the materiel that is of interest to
that service. The U.S. Army, for example, assigned the National Ground
Intelligence Center (NGIC) as its executive agent for acquiring and exploiting
foreign ground systems. 22
Summary
Though the name sounds similar to materials intelligence discussed in Chapter
15, materiel acquisition is quite different. It involves acquiring a piece of
equipment or a component—such as an integrated circuit chip, a vehicle, a
computer, a missile, or a radar. The acquisition is usually for one of two
purposes. The first purpose is to reverse engineer a component or a piece of
equipment. The second purpose is for performance analysis, to determine the
strengths and weaknesses of the equipment. This is the premier example of a
boutique INT; whether for military or commercial purposes, materiel acquisition
is targeted on specific items, and the exploitation is tailored to meet specific
objectives.
Acquisition of military equipment often is a result of a successful HUMINT
operation, as the acquisition is usually a clandestine effort. Clandestine
acquisition is the preferred technique because the acquirer usually does not want
the opponent to be aware of the effort. However, military equipment also is
acquired as a result of combat operations or from defectors.
Once the materiel has been acquired, it must be exploited for its intelligence
value. Exploitation often begins in the field, in the case of captured military
equipment. Large items such as ground vehicles, radars, and aircraft
subsequently receive detailed exploitation (performance testing) at test ranges.
Small items usually are examined in laboratories.
In either case, after performance testing of the item, product teardown is the
next exploitation step. The purpose here is to conduct a detailed examination of
the design and the quality and function of components that it uses. If it hasn’t
already been done, the components of military hardware will be checked for
factory markings that help identify equipment producers and production
quantities.
Commercial firms typically acquire their competitors’ products for
exploitation. Usually they do this for performance testing to determine the
product’s strengths and weaknesses. Sometimes, they acquire in order to reverse
engineer the product and to produce a duplicate.
NOTES
1. Ralph Linton, The Tree of Culture (New York: Alfred A. Knopf, 1955), 105.
2. “Feds: High-Tech Smuggling Ring Sent U.S. Electronics to Russian Spy, Military Agencies,” NBCNews.com (October 4, 2012), accessed 4 October 2012 at
http://usnews.nbcnews.com/_news/2012/10/04/14213457-feds-high-tech-smugglingring-sent-us-electronics-to-russian-spy-military-agencies?lite.
3. US Army FM 2-0, Intelligence, (March 2010), Chapter 13.
4. “Support to Operation Iraqi Freedom” (Washington, DC: Central Intelligence Agency, posted April 25, 2007), accessed 29 June 2012 at https://www.cia.gov/library/reports/archived-
reports-1/Ann_Rpt_2003/iraq.html.
5. “Support to the War on Terrorism and Homeland Security” (Washington, DC: Central Intelligence Agency, posted April 30, 2007), accessed 29 June 2012 at
https://www.cia.gov/library/reports/archived-reports-1/Ann_Rpt_2002/swtandhs.html.
6. Alfred Price, Instruments of Darkness (London, UK: William Kimber, 1967), 80–87.
7. Ibid.
8. Newsday (April 11, 1989), 2.
9. US Army FM 2-0, Intelligence (March 2010), Chapter 13.
10. “MiG-25 Foxbat,” accessed 16 September 2012 at www.spyflight.co.uk/foxb.htm.
11. Global Aircraft, “MiG-25 Foxbat,” accessed 16 September 2012 at http://www.globalaircraft.org/planes/mig-25_foxbat.pl.
12. John Barron, MiG Pilot: The Final Escape of Lt. Belenko (New York: McGrawHill, 1980).
13. Ibid.
14. Ibid.
15. T. D. Barnes, “Exploitation of Soviet MiGs at Area 51,” accessed 28 July 2012 at http://area51specialprojects.com/migs_area51.html.
16. Barron, MiG Pilot.
17. Isadore Herman, “Estimating Aircraft Performance,” Studies in Intelligence (Washington, DC: Center for the Study of Intelligence, posted May 8, 2007), accessed 29 June 2012 at
https://www.cia.gov/library/center-for-the-study-ofintelligence/kent-csi/v016n01/html/v06i1a02p_0001.htm.
18. Arthur G. Volz, “A Soviet Estimate of German Tank Production,” The Journal of Slavic Military Studies, Vol. 21, No. 3 (July 2008), 588–590.
19. Sydney Wesley Finer, “The Kidnapping of the Lunik,” Studies in Intelligence (Washington, DC: Center for the Study of Intelligence), accessed 24 September 2012 at
https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/v0111n01/html/v11i1a04p_0001.htm.
20. Kerber, Leonid. “TU-4 Bomber Epic.” A compilation of articles published from 1988 to 1990 (in Russian). Accessed 29 June 2012 at http://militera.lib.ru/memo/russian/kerber/02.html.
See also Wayland Mayo, “Russian B-29 Clone—The TU-4 Story,” accessed 29 September, 2012 at http://www.rb-29.net/html/03RelatedStories/03.03shortstories/03.03.10contss.htm.
21. US Army FM 2-0, Intelligence (March 2010), Chapter 13.
22. US Army manual FM 34-37 (January 15, 1991), Chapter 8.
23. See, for example, the services offered commercially by SASI at http://www.sasi-corp.com/forsales.htm and by Culmen International at http://www.sasi-corp.com/forsales.htm and by
Culmen International at http://www.culmen.com/?page=pg&pid=18.
18. Managing Intelligence Collection
A large intelligence service, such as that of the United States, with its worldwide
interests, many collection assets, and many targets, faces a daunting management
challenge. This chapter discusses some of the issues in managing collection,
with emphasis on management as it is practiced in the United States.
It is true that none of the steps in an intelligence system can occur without
collection, at one time or another, preceding them. It is also true that the
collection product cannot be delivered without a system of preceding steps:
• Intelligence priorities must be set. (Collectors are not involved in this step.)
INTELLIGENCE PRIORITIES
Intelligence priorities derive from national interests and priorities, which are
usually expressed by the top levels of the executive branch, and increasingly the
U.S. Congress. Intelligence priorities also must reflect existing and anticipated
threats and opportunities as well as political, economic, and military constraints.
Intelligence priorities are particularly important to establish when collection
assets can be allocated against a very large target set, and a subset must be
selected for targeting. Almost all collection fits this definition. Almost any
geographical location on earth can be targeted for visible or spectral imagery
collection, but targeting all the earth would saturate overhead collection
capabilities, and processing and exploitation of such worldwide collection
simply could not be done. The same limitation applies to ELINT collection, with
the added restriction that all available ELINT assets probably could not cover the
entire radio frequency (RF) spectrum worldwide. In both cases, the collection
problem has to be bounded, and intelligence priorities help to serve this purpose.
The challenge, then, is to develop an effective system for establishing
intelligence priorities.
Many attempts have been made to formalize intelligence priorities since the
National Security Act of 1947. The following are some of them:
• After the end of the Cold War, the United States reshaped its
intelligence priorities to reflect the new realities. The initial result was
Presidential Decision Directive 35 (PDD-35), which defined policy goals and
intelligence needs. It separated intelligence requirements into two broad
categories: so-called hard targets (such as Libya, Cuba, Iraq, Iran, and North
Korea) and transnational issues (such as international crime, terrorism, and
weapons proliferation). PDD-35 used a tier structure, with upper-tier countries
having higher priority. The PDD-35 priorities did not change for many years
4
after 1995, despite changes in the international scene including the growth of the
international terrorist threat.
• In 2003, the director of national intelligence (DNI) implemented the
National Intelligence Priorities Framework (NIPF), discussed below, to replace
PDD-35.
• Collectors and analysts tend to focus their efforts on the top priorities in
any prioritization system and leave little or no resources to address lower
priorities.
5
The NIPF is the current guidance from the DNI to the intelligence
community on national intelligence priorities. It is reviewed by the National
Security Council (NSC) and approved by the president. The NIPF guides
prioritization for the operation, planning, and programming of U.S. intelligence
collection and analysis. The NIPF is updated annually. It takes the form of a
matrix of countries and nonstate actors of intelligence interest versus a set of
intelligence topics. It is used to guide both collection and analysis of
intelligence. Former National Intelligence Council Director Tom Fingar has
described the NIPF as a matrix of
Because the NIPF is reviewed at the NSC and not left to a subordinate
interagency mechanism, it appears to be more successful than its predecessors.
In the past, the urgency of many military requirements has tended to squeeze out
the satisfaction of less time-sensitive, but nonetheless important, national
requirements. But at the NSC the requirements of the Departments of State,
Homeland Security, Justice, Treasury, Energy, CIA, and others get reviewed
along with DoD requirements. The result is a longer term perspective on
intelligence needs than that associated with immediate military operations
support.
8
REQUIREMENTS
COLLECTION PRIORITIES
COLLECTION STRATEGIES
For the sake of argument, let’s say that national interests have been properly
transformed into clear intelligence priorities, which have, in turn, been translated
into a well-reasoned requirements hierarchy. The collection management system
knows what it needs to do and turns to the how of getting it done.
A collection strategy can be described as a systematic plan to optimize the
effective and efficient tasking of all capable, available, and appropriate
collection assets and resources against requirements, where
and inexpensive. Imaging of suspected burial sites might come next in order of
difficulty and cost, probably followed by communications intelligence
(COMINT). The tasking of human sources, while not necessarily expensive,
could be highly risky and therefore used as a last resort—that is, only if nothing
else satisfies the requirement.
The point of these examples is that a collection strategy must consider all
outstanding intelligence requirements, their relative priority, and the immediate
situation in allocating scarce resources. And to repeat the point, an expensive or
risky source should not be used when a cheaper or less risky one can do the job.
A few collection problems are easy. A missile silo needs to be checked to
ensure that it is still operational. The collection involves getting an overhead
optical image of the silo so that the image can be processed and exploited. This
solution requires little thought and not much coordination.
However, as previously noted throughout this book, today’s targets are
more complex. If the target to be checked is a mobile missile instead of a fixed
silo, then the missile must first be located. The immediate question becomes:
What assets should be tasked to locate the missile? There are several choices—
visible and synthetic aperture radar (SAR) imagery are two choices for obtaining
imagery of the possible missile locations. Each has its advantages, depending on
the possible missile locations, camouflage, and the size of the area to be imaged.
ELINT or communications intercepts might be used to locate the missile. Human
intelligence (HUMINT) collection might be possible, or some combination of
these might be necessary. In some cases, on-site inspection may be an option for
locating the missile because of an arms verification treaty. And of course, open
source can sometimes provide clues to missile locations.
Given the range of possible collection scenarios for complex targets, it is
necessary to develop a collection strategy before tasking collection assets. This
means considering the utility of all possible collectors and coordinating their use
across several different organizations.
Collection managers therefore try to develop strategies that integrate
tasking and collection of multidisciplinary assets to obtain maximum value from
the collection. The idea is to leverage the unique capabilities of each asset and to
manage and allocate the collection resources to provide more value than
independently developed strategies can achieve. Such collaborative strategies
can use one of two approaches: 12
example, HUMINT enables many other collection efforts, and vice versa:
Such cross-cueing of collectors can be done in real time or near real time,
and it has a special name in the intelligence business: it is called tip-off. In many
cases, a collection target has a very fleeting lifetime. So planning for tip-off is an
important part of collection strategy. The actual tip-off is done in the tasking
phase, but it has to be planned for in the strategy phase. Coordinated tasking of
collection from a variety of sensor platforms and regimes is crucial to solving
tough intelligence problems. Sometimes, collection is only wanted if certain
events occur. This is one purpose served by tip-off. For example, radar detection
of an unidentified aircraft can be used to tip off ELINT collection against the
aircraft’s radar to help identify the aircraft.
Following are two other examples of collection strategies that are used to
deal with difficult collection problems.
Probing Strategy. Against targets that practice denial and deception, provocative
probing can sometimes be of benefit. In the U.S. Air Force airborne
reconnaissance programs dating back to the 1950s, probing was used effectively
to overcome the practice of emissions control by the Soviet Union. In emissions
control, all nonessential signals were kept off the air until the signals intelligence
(SIGINT) collector had left the area. The U.S. response was to send an aircraft
on a penetration course toward the Soviet border, for example, and turn away at
the last minute, after the Soviets had turned on their entire air defense network to
deal with the threat. Probing an opponent’s system and watching the response is
a useful tactic for learning more about the system. The reaction to probing may
have its own set of undesirable consequences, however: The Soviets would
occasionally chase and shoot down the reconnaissance aircraft to discourage the
probing practice.
Analysts must be willing to admit what they don’t know in order to focus
future collection efforts.
15
TASKING
The next step in the front-end process is tasking of collection assets. Tasking
involves providing specific guidance to a specific collector. A collection
requirement might request “an image of Latakia harbor at sufficient quality to
identify cargo vessels in the harbor.” The tasking to support this requirement
might specify “U-2 mission 1037: collect NIIRS 6.5 visible imagery, 2 × 2 NM
frame centered on 35° 32′ N, 35° 46′ E at approximately 0200Z hours on 27 July
2013.”
Missile and aircraft foreign instrumentation signals intelligence (FISINT)
tasking is more event-oriented; collection can occur only during or immediately
before flight times. ELINT tasking is somewhere in between—automated but
with tasking controlled by events. One seldom knows when a signal of high
importance will suddenly appear.
An example of how software handles automated imagery tasking is the
algorithm developed to handle tasking of the Hyperion hyperspectral imager that
is on NASA’s EO-1 satellite. The software has available cloud data generated by
the Air Force Weather Agency and uses it to task Hyperion so that the sensor
won’t attempt to image clouded areas. It is designed to manage the convergent
and sequential collection strategies discussed earlier. That is, it can support ad
hoc tasking. It can identify available collection resources, recommend how they
should be allocated against targets, and time individual collectors to get the best
geolocation accuracy and image resolution. 16
Tasking must not only be specific, as the U-2 example above illustrates. It
must often include background information to help the collector. Many
requirements need amplification or explanation. A formal requirements system
too often does not allow the needed level of amplification. It is difficult to
provide for all the nuances and conditions that accompany a requirement. Both
materiel and materials collection, for example, require very specific guidance;
most successful collections occur when the collectors fully understand the what,
when, where, and why. Consider R.V. Jones’s tasking on collection against the
Würzburg radar, discussed in the case study of Chapter 17. The guidance was
highly specific on what parts to bring back. Sometimes, the collectors even need
advice about how to collect. For example, the collection of a biological sample
or factory effluent may require collection under very specific conditions, and the
sample may need to be handled, stored, or transported only in a certain fashion.
As another example from Chapter 13, FISINT collected after the second-stage
burnout of a ballistic missile has far less intelligence value than FISINT
collected up to that point.
Exactly what sort of management tool will emerge from these programs,
and what it will look like, remains an open issue. However, the uniform goal of
these efforts paints a picture of what the ideal collection management system
would look like. In this picture, analysts and collectors would be able to work in
concert to manage opportunities and diminish duplication. Collectors would
know what other collectors are doing so that they could anticipate synergistic
opportunities. And the system would function effectively across many different
classification levels.
As the U.S. intelligence community evolved after World War II, specific
organizations grew up surrounding collection disciplines and technical
specialties within them. For example, the NSA focused on SIGINT—
especially the collection, processing, decryption, and analysis of
adversaries’ communications. CIA’s Directorate of Operations developed
the expertise surrounding the spotting, recruitment, vetting, tasking, and
running of clandestine human sources, including the ability to communicate
covertly (HUMINT). CIA’s National Photographic Interpretation Center
(NPIC) became the technical experts at the inter pretation of satellite and
other imagery (IMINT). These specialty organizations became known as
stovepipes. They managed the process of their specialties from cradle to
grave.
The stovepipes exist, but they should not be thought of as being just HUMINT or
COMINT stovepipes, for example. There are, in fact, four types of stovepipes:
organizational, compartmented, technical, and international. All four of these
have valid reasons to exist. The challenge is to make the collection system
function more effectively with stovepipes, because they are not likely to
disappear.
ORGANIZATIONAL STOVEPIPES
• Military combat units all strongly prefer to have their own intelligence
collection and analysis units. A long-standing principle of military commanders
is summed up by this statement: “If I don’t control it, I can’t rely on it.” The
assumption is that only one of their own can properly understand their unique
needs.
• All organizations want their intelligence successes to be recognized and
find it difficult to see another organization take even partial credit. Managers
naturally tend to highlight their successes and downplay the contributions of
other organizations. This general disinclination to share the fruits of successes
hurts the potential for collaboration.
• A closely related incentive is provided by the competition for funding.
Funding decisions depend on achieving recognition by the organization
providing funds—in this case, the U.S. Congress. Groups that Congress regards
as providing highly valuable intelligence tend to get funded; less visible
contributors see their funding cut.
issue across all collection with a collaborative focus on targets, addressing the
priorities discussed in previous sections, so that the available assets can
complement each other. Such a level of collaboration requires a common
objective, compatible policies among agencies, and interoperable systems.
Information sharing among collectors has improved in recent years, but it has
room to improve yet.
Nevertheless, there have been attempts to manage collection across
organizational stovepipes. The initial attempt to do all-source collection
management resulted from Presidential Executive Order 12036 in 1977. It
established the National Intelligence Tasking Center (NITC) under the direction,
control, and management of the director of central intelligence for coordinating
and tasking national foreign intelligence collection activities by all elements of
the intelligence community, including the DoD and FBI. The effort was
generally opposed by other agencies and ultimately just disappeared. 29
The DNI has established the National Intelligence Coordination Center
(NIC-C) to oversee the use of all IC collection assets and to facilitate
collaboration among collection organizations. The NIC-C has an ambitious
agenda that includes front-end management, coordination, and collection
evaluation. It appears to have the goal of achieving the ideal collection
management system described at the beginning of this chapter. Whether it can
succeed where the NITC did not, given the tenacity of the organizational
stovepipes, is an open question. Strong incentives exist to maintain these
stovepipes. Until the incentives are dealt with, an organization like NIC-C faces
continuing challenges to its authority. Meanwhile, much of the success in
collaboration appears to come from individuals in the intelligence community
who work across the organizational boundaries, respecting the sensitivities of
their partners and understanding their cultural mores.
COMPARTMENTED STOVEPIPES
The U.S. intelligence and defense communities have a large number of special
access programs (SAPs), often called black programs. These programs also are
referred to as compartmented programs because they are protected by special
security compartments to which access is highly restricted. Compartmentation
has an obvious benefit: The program’s success is usually dependent on an
opponent being unaware of its existence or what it does. The steady loss of
collection assets supports those who argue for more compartments, and, in fact,
the compartments continue to proliferate. But compartmentation stovepipes have
their price:
TECHNICAL STOVEPIPES
Technical stovepipes exist because of the need to pull together pools of expertise
on tough collection issues. But the specialists in one field of collection usually
do not have in-depth knowledge of the other fields and so often do not recognize
the opportunities for cooperation. As an example, optical and SAR imagery
collection are usually under a single overall organizational stovepipe—NGA in
the United States. But the required technical expertise is quite different for
collection and processing of these two types of imagery. Optical engineers work
in the former, and radar engineers are needed in the latter. Across all of technical
collection, the different INTs require a wide variety of skill sets, and
practitioners typically have little in common in the different subdisciplines. Also,
collection is characterized by a wide range of cultures speaking in different
tongues; communication across disciplines is difficult—mirroring a problem that
exists in the world of basic and applied research. Furthermore, because many of
the technical collection assets are poorly understood, and because there are so
many of them, users do not take advantage of their potential. It is difficult to task
and to exploit the results of tasking.
The signature libraries that characterize nonliteral collection may be the
most stovepiped part of a stovepiped community. Each library is designed for
effective use by the subdiscipline that it supports. The result is that any effort to
reach across libraries in collaborative analysis efforts is very frustrating.
Analytical software that can access one library generally cannot make use of any
other library.
In spite of the problems created by technical stovepipes, they fill an
important need. A critical mass of expertise is necessary for progress in any
collection discipline, and technical stovepipes serve this purpose.
INTERNATIONAL STOVEPIPES
described in Chapter 11, has been deployed to Japan. And the Japanese
34
Customers include both the all-source analysts who must use the collection
product and their customers in the military, law enforcement, and national policy
communities who must accept the results—and are unlikely to rely on systems
that they do not understand. That is not a great problem for literal intelligence,
which is generally well understood. But much of the non-literal collection
product, except for visible imagery, is poorly understood. Among analysts, the
understanding of nonliteral collection varies according to the analytic specialty:
• Policymakers always want intelligence now, and they often are reacting
to current events—meaning that their needs are unpredictable. Today, it is Sri
Lanka; tomorrow, it is Vanuatu; next week, it is Pakistan.
• Combat operations units increasingly are customers and reliant on
national collection assets for targeting. Like policymakers, these customers have
a timeliness requirement, but they have more predictable needs. Intelligence as a
result is becoming more closely tied to operations, even pulling the trigger in
some military operations (for example, CIA using Hellfire missile–equipped
Predator unmanned aerial vehicles [UAVs] to target terrorists).
• The law enforcement community is increasingly reliant on intelligence,
and law enforcement operates at a fast pace. One hour of delay often is too
much.
Intelligence analysts get the most pressure from these timeliness demands
because they are close to the customer, but the collectors also feel it. Many of the
literal intelligence sources have difficulty meeting these demands for timeliness
because language translation often is required.
Technical collection, though, is able to deliver real-time or near real-time
products directly to operational units and policymakers. ELINT and imagery
sources routinely do so today. Some of the newer technical collection
capabilities require extensive processing to obtain the signature because they
rely on experimental and immature technology. The associated processes are
technology-intensive, dependent on specialized expertise, and therefore slow.
The trend as these technologies mature, though, is to automate the processing
and disseminate the product in near real time.
Collection assets have a finite useful lifetime, and sometimes a very short one.
Revelations tend to reduce the value of collection assets, especially in the United
States. No other country seems to compromise its intelligence assets as quickly
as the United States does, and the impact on technical collection is especially
heavy. The consequence is that new technologies need to be developed and
applied constantly, which requires a robust R&D effort. There are some
challenges, though, in maintaining this technological edge.
First, the pressure from customers (cited previously) encourages collectors
to rely on known sources, technology, and targets instead of developing new
ones. The legacy system issue encourages collectors to rely on traditional
sources and traditional ways of doing business. Searching for new radar signals,
for example, often is not encouraged in ELINT; all assets are consumed by the
existing signals, and the demands for coverage of known targets make it difficult
to search for new ones. Analysts support this inclination by demanding more of
the same. Once there is an established set of customers for any set of targets, it is
difficult to stop providing that intelligence. The customers often depend on
continuing to receive the information. For example, if the military’s precision
targeting systems depend on the existence of multispectral imagery of the target
with a certain level of accuracy, then halting the collection of such imagery kills
the effectiveness of an important military capability.
Second, when new collection systems are developed, the workforce has to
be trained to use them. So the intelligence community faces a continuing need to
train its workforce to employ new technologies and to use the capabilities of new
collection assets.
Finally, the U.S. intelligence community must deal with consequences of a
long-standing not-invented-here (NIH) attitude. Many of the IC components
have been reluctant to adopt either commercial technologies or those developed
by other U.S. government agencies. For many decades, this worked; the IC was
ahead of the commercial world in developing and applying new technologies.
But today, commercial entities lead in several collection areas. Las Vegas
gambling casinos were leaders in the application of facial recognition. Microsoft
and other companies took the lead in developing and applying information
technology. Google Earth has raced ahead in the geospatial arena. Accustomed
to being leaders, some IC segments have not adjusted easily to being followers.
Change is hard on all participants, and managing change is especially
difficult. There are entire books written on how to deal with it. But, in the end, it
becomes a simple proposition for every IC manager. Remaining the premier
intelligence force in the world hinges on maintaining a technological edge.
Some types of collection systems have been around for years. Electronic
COMINT dates back to the beginning of telegraphy. ELINT and optical imagery
have been developed and steadily improved since the 1940s. For systems with
such a history, no great difficulty exists in moving the improvements into
operational status. The entire intelligence organization is already familiar with
the collection system and what it can do. Improvements are readily accepted,
even demanded. Intelligence analysts, for example, want more of the same
optical imagery but with better NIIRS quality, and they want it to cover a larger
area more often. The resulting transition of such user-demanded improvements
to operations is relatively smooth.
New types of collection systems face a different, far more difficult, process.
For these new and highly technical assets, there are many barriers in getting to
operational status. It is typically difficult to move sophisticated technical sensors
from R&D to an operational system for several reasons:
• Customers typically do not understand what the new system can offer or
how to use the product, so there is no customer demand. The U.S. intelligence
community was very slow to recognize the potential of SAR, and the program to
develop a SAR almost died several times for lack of funding.
• As noted earlier, there is a continuing demand for existing collection,
and customers are unwilling to abandon existing programs. These legacy
programs have to be funded, taking away funding for new initiatives. No matter
how big the collection system budget, it eventually will be consumed by legacy
programs, so no new starts occur unless they are forced.
• Processing and exploitation typically must be developed from scratch.
Many of the new collection techniques require intensive processing and
exploitation, along with specialized technical expertise, which is in short supply.
• Finally, new systems face an obstacle that system improvements do not
have to deal with, an obstacle so prevalent that it has the ominous name of the
valley of death.
The term valley of death comes to us from the commercial world. There,
the road from a discovery generated from basic research to a commercial product
or process is long and, according to some, rife with significant roadblocks.
Innovators describe the valley as a funding gap that exists at an intermediate
stage of the development process, between basic research and commercialization
of a new product. In this intermediate stage of the innovation process, there is a
dearth of funding for technology projects that no longer count as basic research
but are not yet far enough along for the benefits to be readily recognized. As one
source describes it, this valley is “where good lab discoveries go to die because
they lack the funding necessary to become a commercial product.” 38
Evaluating Collection
Because a large part of any intelligence service’s budget is spent on collection,
those services want to know that they are getting their money’s worth. So,
collection performance must be evaluated both prospectively and retrospectively.
Prospective evaluation for technical collection typically employs simulation
modeling; it is often used before a collection system is developed, especially for
evaluating the potential of overhead collection systems. These systems are very
expensive, so the simulations are well worth the costs of development and
operation.
Once a collection system is in use, three methods have been used to
evaluate the collection product retrospectively:
• Survey the analysts, asking them to evaluate collection reports that were used
in finished intelligence (which consumes valuable analyst time).
• Audit access to the raw intelligence databases. Multiple accesses by the same
person in some defined time frame indicate that a report has more value. (A
problem with this method is that the most valuable reports often are accessed
once and then printed, so you also need to know when a report is printed.)
• Use citation analysis, that is, count the number of times a report is cited in
finished intelligence. But the most useful reports are not necessarily cited,
and highly compartmented reports are typically used as background since
they cannot be used in lower-classification reporting.
• What is the expected size of the 2014 opium crops in Pakistan, Laos,
Mexico, Thailand, Afghanistan, and Burma? Where are the opium
processing centers in these countries, and how much can they process?
All these questions call for analytic conclusions, but all lead to more specific
definitions of measures of user satisfaction.
A poor example of a measure of user satisfaction would be: “How much of
the target area was searched in imagery at a given resolution?” One hundred
percent of the target area could be searched without turning up a single item of
useful intelligence. Collectors are fond of using such quantitative measures
because they provide a firm and technically computable measure. As a result,
many collection organizations have become fixated on numbers—on both
quality and quantity of collection—and insufficiently concerned with content.
For example:
• If the IMINT collectors take 100 pictures of a critical installation, they might
get credit for each image in their collection performance ratings, even if the
last 99 pictures contain nothing new.
Conclusion
The collection management challenges discussed in this chapter stem in part
from the success that the United States has had in developing collection assets
and the wide range of U.S. interests. Intelligence literature often makes a point
of criticizing U.S. intelligence collection capabilities as being cumbersome and
inefficient. It is true that some small government intelligence services, such as
Israel’s Mossad, and a number of multinational corporations can be successful
within the areas where they have concentrated their intelligence expertise. They
also have all the advantages that accrue to a small, tightly knit organization. Still,
U.S. government collection capabilities remain the best in the world. The U.S.
intelligence community has the most resources and does the best systems
planning. It innovates constantly and attempts things few other services would
try. In breadth and depth of coverage, the United States is the benchmark
worldwide.
Summary
The ideal collection management system would maintain a current
understanding of customers’ needs for information and the gaps in knowledge. It
would develop coordinated requirements and allocate collection assets to
maximize the value of intelligence collected. All collectors would be aware of
what the other collectors are doing so that collection assets are used
synergistically. The system would function effectively across many different
classification levels. The processing, exploitation, and analysis of the product
would be done quickly and accurately so that the results get to customers in time
to be of use.
All national intelligence services find that the ideal is difficult to achieve.
Getting closer to it requires dealing with the challenges of
NOTES
1. Center for the Study of Intelligence, Intelligence Monograph, “Critique of the Codeword Compartment in the CIA” (March 1977), accessed 24 September 2012 at
www.fas.org/sgp/othergov/codeword.html.
2. Douglas Gartoff, Directors of Central Intelligence as Leaders of the U.S. Intelligence Community, Center for the Study of Intelligence (March 16, 2007), Chapter 12, accessed 24
September 2012 at www.cia.gov/library/center-for-thestudy-of-intelligence/csi-publications/books-and-monographs/directors-of-central-intelligence-as-leaders-of-the-u-s-intelligence-
community/chapter_12.htm.
3. Ibid.
4. Thomas C. Bruneau and Steven C. Boraz, Reforming Intelligence: Obstacles to Democratic Control and Effectiveness (Austin: University of Texas Press, 2007), 41–45.
5. U.S. House of Representatives, Permanent Select Committee on Intelligence Staff Study, “IC21: The Intelligence Community in the 21st Century” (June 5, 1996), Section III: Intelligence
Requirements Process.
6. Private communication from Professor Peter Oleson, University of Maryland University College (2013).
7. Thomas Fingar, “Analysis in the U.S. Intelligence Community: Missions, Masters, and Methods” in Intelligence Analysis: Behavioral and Social Scientific Foundations, Baruch Fischoff
and Cherie Chauvin, eds. (Washington, DC: National Academies Press, 2011), 18, accessed 24 September 2012 at http://www.nap.edu/catalog/13062.html.
8. Private communication from Professor Peter Oleson, University of Maryland University College (2013).
9. Roy Godson, Intelligence Requirements for the 1990s (Lanham, MD: Lexington Books, 1989), 68.
10. DoD Joint Publication 2-01, “Joint and National Intelligence Support to Military Operations” (January 5, 2012), Chapter 3, accessed 24 September 2012 at
http://www.dtic.mil/doctrine/new_pubs/jp2_01.pdf.
11. Private communication from Professor Peter Oleson, University of Maryland University College (2013).
12. IC21, Section IV: Collection Synergy.
13. Scott C. Poole, “Integrated Collection Management Accelerates Interagency Cooperation,” NGA Pathfinder, Vol. 6, No. 3 (May/June 2008), 8, accessed 24 September 2012 at
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ada493139.
14. “Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction,” 125, accessed at http://www.gpo.gov/fdsys/pkg/GPO-
WMD/content-detail.html.
15. Ibid., 12.
16. Mark Abramson, David Carter, Brian Collins, Stephan Kolitz, John Miller, Peter Scheidler, and Charles Strauss, “Operational Use of EPOS to Increase the Science Value of EO-1
Observation Data,” accessed 24 September 2012 at http://esto.nasa.gov/conferences/ESTC2006/papers/a3p1.pdf.
17. GlobalSecurity.org, “Joint Collection Management Tools,” accessed 4 April 2013 at www.globalsecurity.org/intell/systems/jcmt.htm.
18. Ibid.
19. Office of the Director of National Intelligence, “FY2008–2009 Congressional Budget Justification,” Vol. 12 (February 2007), 27–28, accessed 24 September 2012 at
http://www.fas.org/irp/dni/cbjb-2008.pdf.
20. Poole, “Integrated Collection Management Accelerates Interagency Cooperation,” 8.
21. NGA Publication 1.0, “National System for Geospatial Intelligence: Geospatial Intelligence (GEOINT) Basic Doctrine” (September 2006), 21, accessed 24 September 2012 at
http://www.fas.org/irp/agency/nga/doctrine.pdf.
22. DoD Joint Publication 2-01, “Joint and National Intelligence Support to Military Operations.”
23. U.S. Commission on National Security/21st Century, Vol. 6, “Intelligence Community” (April 15, 2001), chapter on National Security Agency/Central Security Service, 12, accessed 24
September 2012 at http://govinfo.library.unt.edu/nssg/addedum/Vol_VI_Intel.pdf.
24. Richard A. Best, Jr., “Open Source Intelligence (OSINT): Issues for Congress,” Congressional Research Service (January 28, 2008), accessed 24 September 2012 at
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA488690.
25. Mark M. Lowenthal, Intelligence: From Secrets to Policy, 4th ed. (Washington, DC: CQ Press, 2009), 76.
26. Private communication from Professor Peter Oleson, University of Maryland University College (2013).
27. Gregory F. Treverton, “Toward a Theory of Intelligence” (RAND, 2006), 24, accessed 24 September 2012 at http://www.rand.org/pubs/conf_proceedings/2006/RAND_CF219.pdf.
28. Pamela Hess, “Intelligence Agencies in Turf War,” Associated Press Report (May 28, 2008), accessed 24 September 2012 at
http://www.foxnews.com/wires/2008May28/0,4670,IntelligenceTurfWar,00.html.
29. Gartoff, Directors of Central Intelligence as Leaders of the U.S. Intelligence Community, Chapter 8, accessed 3 April 2013 at https://www.cia.gov/library/center-for-the-study-of-
intelligence/csi-publications/books-and-monographs/directors-of-central-intelligence-as-leaders-of-the-u-s-intelligence-community/chapter_8.htm.
30. “Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction” (March 31, 2005), 444.
31. Ibid., 439.
32. GlobalSecurity.org, “Intelligence and Counterintelligence,” accessed 24 September 2012 at www.globalsecurity.org/intell/world/russia/kgb-su0522.htm.
33. IUSS Caesar Alumni Association, “IUSSHistory 950-2010,” accessed 23 September 2012 at http://www.iusscaa.org/history.htm.
34. “Forward-Based X-Band Radar–Transportable,” Missilethreat.com, accessed 24 September 2012 at www.missilethreat.com/missiledefensesystems/id.19/system_detail.asp.
35. Private communication from Professor Peter Oleson, University of Maryland University College (2013).
36. Ibid.
37. Mark M. Lowenthal, Intelligence: From Secrets to Policy, 4th ed. (Washington, DC: CQ Press, 2009), 107.
38. J. Heller and C. Peterson, “Valley of Death,” in Nanotechnology Investing, Foresight Nanotech Institute, accessed 24 September 2012 at www.foresight.org/policy/brief8.html.
Glossary
Absorption Reduction in the strength of a wave propagating through a medium.
Accuracy Describes how close a measurement is to the true value of the quantity being
measured.
Acoustic Intelligence derived from the collection and processing of acoustic phenomena. Also
intelligence called ACINT for sound in water, and ACOUSTINT for sound in air.
Activity-based A type of all-source analysis that is focused on activity and transactions associated
intelligence with an entity, population, or area of interest.
Adaptive optics An optical technique that cancels the atmospheric turbulence-induced distortions of
an object’s image. Adaptive optics uses movable mirror segments or deformable
continuous mirrors to compensate for image degradation.
Aerostat A lighter-than-air vehicle that can remain stationary in the air.
All-source A process or analytic product making use of all available and relevant sources of
analysis information; also called finished intelligence.
Angular The minimum angular separation between distinguishable objects observed by a
resolution sensor.
Antenna Device to radiate or receive radio frequency energy.
Apogee The point at which an object in orbit around the earth—a satellite or other body—is
at the greatest distance from the earth.
Artifact In synthetic aperture radar usage, a distortion resulting from the target violating one
of the assumptions used in radar processing. See multibounce and layover for
examples.
Ascending pass A satellite’s travel northward on one side of the earth.
Aspect angle Description of the geometric orientation in the horizontal plane of an object in the
scene.
Atmospheric Wavelengths in the millimeter wave or optical part of the spectrum where the
windows atmosphere is transparent or nearly so.
Attenuation Decrease in the strength of an EM signal.
Azimuth The relative position of an object horizontally within the field of view, usually
measured from true North.
Azimuth The minimum azimuthal separation between distinguishable objects observed by a
resolution sensor.
Backdoor A software implant allowing access to a computer network or individual computer,
bypassing security procedures. Often called an exploit.
Backscatter The signal reflected by elements of an illuminated scene back in the direction of the
sensor.
Ballistic A performance measure for ballistic missile reentry vehicles based on the vehicle’s
coefficient weight, drag, and cross-section; vehicles with a high ballistic coefficient penetrate the
atmosphere more quickly than those with a low ballistic coefficient. Also called beta.
Bandwidth A measure of the span of frequencies that are available in a signal or can be collected
by a sensor.
Baseline See basic encyclopedia.
Basic A compendium of installations worldwide that might be of interest to intelligence
encyclopedia agencies and to the operational and planning staffs of military commands. Also called
a baseline.
Beamwidth A measure of the width of the radiation pattern of an antenna.
Beta Term used to refer to the ballistic coefficient of a reentry vehicle.
Bhangmeter An optical sensor deployed on satellites to detect the dual flash that characterizes
atmospheric nuclear explosions.
Biometric A biological identifying characteristic, customarily used in reference to humans.
signature
Biometrics The science and technology of measuring and analyzing biological data.
Bistatic radar A radar with transmitter and receiver widely separated in order to obtain a different
signature from that of a monostatic radar or to defeat jamming.
Black program A name applied to highly compartmented or special access programs.
Blackbody An object that absorbs all incident electromagnetic energy and consequently radiates
perfectly; such an object would be completely black, reflecting no energy.
Blitz A technique for allocating collection assets to provide relatively brief but intensive
coverage of specific targets.
Botnet A set of computers controlled by a “command-and-control” (C&C) computer to
execute commands as directed. Computers in a botnet are called nodes or zombies.
C band Microwave radar band between 5250 and 5925 MHz.
Calibration The process of quantitatively defining the system responses to known, controlled
signal inputs.
Case officer A professionally trained employee of an intelligence service with responsibility for
managing human agents and agent networks.
Change detection Any technique for observing changes in an image over time.
Charge-coupled The name applied to an array of solid-state devices that detect incoming photons in
devices (CCDs) an image sensor.
Chirped pulse Frequency modulation applied to a radar pulse for the purpose of obtaining high-
range resolution with a long pulse. Often called linear frequency modulation (LFM).
Chromatography A laboratory technique for separating the chemical components of a mixture.
Cipher An algorithm for performing encryption of a message.
Clandestine An operation characterized by the opponent being unaware that the operation
happened at all.
Clandestine The arm of an intelligence organization responsible for the conduct of clandestine
service operations.
Coherent A property of a signal such that the signal phase is measurable (for example, over
many pulses of a radar).
Coherent change Using a synthetic aperture radar to, in effect, overlay two radar images, in order to
detection (CCD) produce a picture of what changed in the time between the two images. It does this by
measuring and storing both the intensity and phase (phase history data) of each image
pixel.
Collateral Material or information that is extrinsic to a collection organization, usually
reporting or intelligence that is produced by another collection INT.
Communications Intelligence information derived from the intercept of communications by other than
intelligence the intended recipients.
(COMINT)
Competitive Intelligence collected about business competitors, including their plans, strategy, and
intelligence products.
Contrast Difference between the tone of two neighboring regions in an image.
Contrast A processing technique that involves increasing the tonal distinction between various
enhancement features in a scene.
Covert An operation wherein the results are apparent, but the source of the operation either
is not apparent or has plausible deniability.
Cross-track Also known as an optical-mechanical or “whiskbroom” scanner; it uses a scanning
scanner mirror that projects the image of a surface resolution element onto a single detector.
Cryptanalysis The process of “breaking encryption” or decrypting encrypted messages by other
than the intended recipients.
Dangle An attractive potential recruit intentionally placed in front of a hostile intelligence
service.
Data cube A three-dimensional representation of a hyperspectral image.
Descending pass The part of a satellite orbit traveling southward.
Detection The minimum level of signal intensity that a sensor can detect.
threshold
Diffuse Reflection typically made up of many individual reflections of energy having
random phase with respect to each other, such as from a natural forest canopy or
agricultural field. The term is also used to describe a surface that reflects
electromagnetic illumination in this fashion. The opposite term is specular.
Digital image An image that has been placed in a digital file with brightness values of picture
elements (pixels) representing brightness of specific positions within the original
scene.
Direction finding Measurement of the direction of arrival of a signal.
(DF)
Dissemination The communication of processed and exploited raw intelligence to customers in
paper or electronic form.
Doppler A shift in frequency caused by relative motion along the line of sight between the
sensor and the target.
Doppler effect A change in the observed frequency of an acoustic or electromagnetic signal emitted
(Doppler shift) by or reflected from an object, when the object and the observer are in motion relative
to each other.
Drive-by A website containing malicious software that takes advantage of vulnerabilities in
download site web browsers and browser add-ons.
Dwell time Length of time that a sensor can maintain access to a target.
Dynamic range The ratio of the maximum to the minimum observable signal. The maximum signal
is the signal at which the system saturates, while the minimum signal is usually
defined as the noise floor.
Edge An imagery enhancement technique commonly used in processing images for
enhancement intelligence, characterized by highlighting the edges of target objects.
Electromagnetic A wave described by variations in electric and magnetic fields. Light waves, radio
(EM) wave waves, and microwaves are examples. All such waves propagate at the speed of light
in free space.
Electronic Information derived from the intercept of intentional electromagnetic radiations,
intelligence primarily radar, that do not fall into the categories of COMINT or FISINT.
(ELINT)
Electro-optical An imaging sensor that converts incoming light energy to an electrical signal for
(EO) imagers transmission and storage.
Elicitation The practice of obtaining information about a topic from conversations, preferably
without the source knowing what is happening.
Ellipsometry Another name for optical polarimetry.
Emissive band The optical spectrum band extending from mid-wavelength infrared through long-
wavelength IR and into the far IR region.
Emissivity A property of an object that describes how its thermal emissions deviate from the
ideal of a blackbody.
Error ellipse In geolocation, an ellipse on the earth’s surface within which a target of interest has a
50% probability of being located.
Exploit Malware that takes advantage of software vulnerabilities to infect, disrupt, or take
control of a computer without the user’s consent and preferably without the user’s
knowledge; often called a backdoor.
Exploitation The transformation of processed collection results into a product that can be used by
customers or all-source analysts.
f number In optics, the ratio of focal length to aperture diameter.
Factory Identifying markings placed on military equipment for inventory and quality control
markings purposes. Such markings have intelligence value because they can identify the source
of the equipment and the quantity produced.
False alarm A noise or interfering signal that is mistaken for the desired signal.
False color An image that depicts a subject in colors that differ from those a faithful full-color
photograph would show, usually by shifting the colors in each pixel to longer
wavelengths.
False negative A desired signal that is discarded as interference or noise.
False positive Another term for false alarm.
Far infrared The infrared band lying between 15 |xm wavelength and the millimeter wave band.
Field of regard The total area that a collection platform is capable of seeing.
Field of view A defined volume of space that a sensor can see at any instant.
Fluidics The technology of using pressures and flows of fluids for sensing and control. In
intelligence, the collection of sound traveling in conduits for acoustic monitoring.
Focal length In optical systems, the distance between the entrance aperture and the focal plane.
Focal plane The surface at which an optical image is in focus.
Focal plane A planar array of optical sensors placed at the point where the optics focus incoming
array light energy.
Foreign Information derived from the intercept of foreign instrumentation signals by other
instrumentation than the intended recipients. Foreign instrumentation signals include but are not
signals intelligence limited to signals from telemetry, tracking/fusing/arming/firing command systems,
(FISINT) and video data links.
Forward-looking An infrared imaging system designed to operate at night, so called because it is
infrared (FLIR) usually mounted on an aircraft or vehicle and looking in the direction of travel.
Framing camera A camera using conventional optics with a planar array of detectors located in the
camera focal plane.
Frequency Rate of oscillation of a wave, measured in hertz (oscillations per second).
Frequency A technique for geolocating an emitter by measuring and comparing the Doppler
difference of shifts at different receivers where relative motion exists between the emitter and the
arrival (FDOA) receivers.
Frequency Multiplexing done by allocating a different part of the radio frequency spectrum to
division each stream of communication.
multiplexing
Frequency A radar technique where the signal periodically moves to a different frequency (often
hopping with each pulse transmitted).
Frequency- An antenna that maintains almost constant beamwidth over a very wide frequency
independent band (the upper-frequency limit being several times the lower-frequency limit).
antenna
Frequency A measure of the ability to distinguish two signals that are closely spaced in
resolution frequency.
Front end The process that involves collection planning, specifically the development of
requirements, collection priorities, collection strategies, and tasking of collectors.
Fully Transmitting and receiving both polarizations simultaneously; used to describe a type
polarimetric of SAR.
Gain Change in signal level due to processing functions that increase the magnitude of the
signal.
Geolocation The process of pinpointing the location of an object on the earth or in space.
Geolocation The accuracy of measuring the location of an object on the earth or in space.
accuracy
Geophone A type of microphone used to measure seismic disturbances.
Geospatial The all-source analysis of imagery and geospatial information to describe, assess,
intelligence and visually depict physical features and geographically referenced activities on the
(GEOINT) earth.
Geostationary An orbit above earth’s equator at an altitude of 35,800 km, where the orbital period is
orbit (GEO) 24 hours, equal to that of the earth’s rotation.
Glint A brief strong radar return, caused when the radar cross-section of a target suddenly
becomes very large.
Global coverage In intelligence, maintaining awareness of opportunities and threats to national
interests worldwide.
Grazing angle The minimum angle of elevation, measured from a ground target to a satellite, at
which the satellite can observe the target.
Ground moving See moving target indicator.
target indicator
(GMTI)
Ground sample The distance between the center of adjacent pixels in a sensor image.
distance (GSD)
Highly elliptical An extremely elongated orbit characterized by a relatively low-altitude perigee and
orbit (HEO) an extremely high-altitude apogee. These orbits can have the advantage of long dwell
times during the approach to and descent from apogee.
Human Intelligence information derived from the use of human beings as both sources and
intelligence collectors, and where the human being is the primary collection instrument.
(HUMINT)
Hydrophone A microphone designed to be used underwater for recording or listening to
underwater sound.
Hyperspectral Optical imagery that uses hundreds of spectral bands.
images (HSI)
Image Mapping of the radar or optical reflectivity of a scene.
Image Processing technique used to improve the appearance of the imagery to assist in
enhancement visual interpretation and analysis.
Imagery Intelligence information derived from the collection by visual photography, infrared
intelligence sensors, lasers, electro-optics, and radar sensors, such as synthetic aperture radar,
(IMINT) wherein images of objects are reproduced optically or electronically on film, on
electronic display devices, or in other media.
Imaging A sensor that measures the intensity of EM radiation while obtaining an image of the
radiometer target. It creates, in effect, a “radiometric map.”
Imaging A sensor that obtains an image of a target while measuring the spectral
spectrometer characteristics of each object in the image.
Incidence angle Angle between the line of sight from the sensor to the target and a vertical direction
measured from the target surface.
Inclination In space systems terminology, the angle of a satellite’s orbit measured
counterclockwise from the equatorial plane.
Incoherent (or Property of a signal in which the phases of the constituents are not statistically
noncoherent) correlated or systematically related in any fashion.
Incoherent In radar imagery, observing changes to a scene between imaging events that are
change detection caused by changes in the intensity of energy returned from target pixels. Contrast with
coherent change detection.
Infrared Intelligence information associated with emitted or reflected energy derived from
intelligence monitoring the electromagnetic infrared spectrum.
(IRINT)
Instantaneous The angular aperture within which one pixel of a sensor is sensitive to
field of view electromagnetic radiation, measured in degrees.
(IFOV)
Integrated A network of acoustic arrays, some towed behind ships and submarines and some
undersea fixed to the seafloor, designed to locate and track submarines at long distances. See
surveillance sound surveillance system (SOSUS).
system (IUSS)
Intensity The degree to which a sensor can resolve differences in intensity.
accuracy
Intensity The range of intensity that a sensor can receive and process linearly. See dynamic
coverage range, which has the same meaning.
Intensity The measure of the difference in signal intensity that can be detected and recorded
resolution by a sensor. Also called radiometric resolution.
Interferometer A sensor that receives EM energy over two or more different paths and deduces
information from the coherent interference between the received signals.
Interpretability The ability to identify and distinguish objects, features, patterns, and textures within
an image and to determine their significance.
Inverse synthetic A technique to generate a two-dimensional image of a moving object from a fixed
aperture radar radar location by coherently processing echoes from the object as it moves.
(ISAR)
Keystroke logger Malware that captures and records keystrokes.
L band Microwave radar band between 1215 and 1400 MHz.
Layover In synthetic aperture radar, an extreme form of elevation displacement or
foreshortening in which the top of a reflecting object (such as a mountain) appears
closer to the radar (in slant range) than do the lower parts of the object. The image of
such a feature appears to have fallen over toward the radar.
Legacy system An existing collection effort with an established customer set, where customer
demand makes it difficult to terminate the effort.
Library A repository of raw intelligence, usually of signatures resulting from nonliteral
collection.
Linear frequency Modulation on a signal causing it to increase or decrease linearly in frequency over
modulation time. Also known as chirp.
(LFM)
Literal Information in a form that humans use for communication.
information
Low earth orbit Satellite orbits between 200 and 1500 km above the earth’s surface.
(LEO)
Low probability The use of transmitted power management or signal modulation to make it difficult
of intercept (LPI) for SIGINT systems to collect RF signals.
Magnetic A magnetometer that is used by military forces to detect submarines or in geology to
anomaly detector search for minerals by observing the disturbance of the earth’s normal magnetic field.
(MAD)
Magnetometer A device that senses weak changes in the earth’s magnetic field.
Magnetometry The science of sensing magnetic fields.
Materials As used in intelligence, physical or biological samples acquired for exploitation.
Materiel In collection, physical objects and equipment acquired for intelligence purposes,
usually clandestinely.
Measurements Intelligence information obtained by quantitative and qualitative analysis of data
and signatures derived from specific technical sensors for the purpose of identifying any distinctive
intelligence features associated with the source, emitter, or sender, and to facilitate subsequent
(MASINT) identification and/or measurement of the same.
Medium earth Satellite orbits typically between 10,000 and 20,000 km altitude.
orbit (MEO)
Microexpressions Fleeting facial expressions, typically lasting less than one-tenth of a second and
involving a small part of the human face.
Microwave An electromagnetic frequency between 1 and 300 GHz.
Mole An intelligence service employee who is an agent for a foreign intelligence service.
Moving target A feature that allows a radar to detect target motion. It also is called a ground moving
indicator (MTI) target indicator (GMTI).
Multibounce A scattering mechanism in which the electromagnetic wave reflects off more than
one point before returning to the sensor. The simplest example is double-bounce
scattering.
Multifunction In radar use, a radar that can perform more than one of the four functions of search,
radars track, imaging, and target measurement.
Multilateration Also known as hyperbolic positioning, it is the process of locating an object by
computing the time difference of arrival (TDOA) of a signal at different receivers.
Multipath Another term for multibounce, usually referring to a radar or communications signal
that bounces off multiple surfaces before being received.
Multiplexing The combining of independent streams of communication into a single transmission;
used to transmit telemetry.
Multispectral Imagery collected by a single sensor in multiple regions (bands) of the
images (MSI) electromagnetic spectrum. Typically used to refer to the collection of fewer than 100
bands, to distinguish it from hyperspectral imagery.
Multispectral An imaging sensor that scans several spectral bands simultaneously to form multiple
scanner images of a scene.
Nadir A point on the earth’s surface directly below the satellite.
National A 10-level rating scale that defines the ability to identify certain features or targets
Imagery within an image. The NIIRS defines and measures the quality of images and
Interpretability performance of imaging systems.
Rating Scale
(NIIRS)
National A euphemism for satellite collection assets, derived from a term used in the Limited
technical means Test Ban Treaty of 1963.
(NTM)
Near-polar orbit A satellite orbit that passes near the north and south poles.
Near real time Refers to the brief delay caused by automated processing and display between the
occurrence of an event and reception of the data at some other location. The term
typically describes a delay of a few seconds to a few minutes.
Noise Any unwanted or contaminating signal competing with the desired signal. Noise may
be generated within the sensor or may enter the sensor from the outside.
Nonliteral Information in a form that is not customarily used for human communication.
information
Nuclear forensics The collection and analysis of a sample containing nuclear or radioactive material to
determine the history or production process of the material.
Nuclear Intelligence information derived from the collection and analysis of radiation and
intelligence other effects resulting from radioactive sources.
(NUCINT)
Open source Material that is publicly available in print or electronic form.
Operational ELINT that is primarily intended to directly support ongoing military or law
ELINT enforcement operations.
(OPELINT)
Optical Intelligence information derived from radiometric and spectroscopic exploitation of
intelligence optical energy (ultraviolet, visible, and near infrared) resulting in a spatial, temporal,
(OPTINT) or spectral signature of targets.
Optical spectrum That part of the electromagnetic spectrum where optics, rather than antennas, are
used to receive energy (wavelengths shorter than about 300 microns)
Orbit cycle The period of time until a satellite retraces its path, passing over the same point on
the earth’s surface directly below the satellite (the nadir point) for a second time.
Overhead Term commonly used in intelligence literature to refer to collection from satellites.
collection
Overhead See overhead persistent infrared (OPIR).
nonimaging
infrared (ONIR)
Overhead A term applied to spaceborne sensors that detect and track intense emissions of IR
persistent infrared energy over a large area of the earth. Replaces the term overhead nonimaging infrared
(OPIR) (ONIR).
P wave In seismic sensing, a pressure (compressional) wave created by an underground
explosion.
Panchromatic Black-and-white imagery that spans an area of the electromagnetic spectrum,
imagery typically the visible region.
Pattern The product of analysis (frequently of signatures).
Perigee The point at which an object in orbit around the earth—a satellite or other body—
makes its closest approach to the earth.
Period Time duration of one cycle of a wave or one cycle of any regularly recurring pattern.
Period is inversely equal to frequency.
Phase coding A type of modulation on a radar pulse caused by periodically changing the phase of
the transmitted signal to improve range resolution.
Phase history The raw data collected by a SAR system prior to range and azimuth compression.
data (PHD) Slight differences in frequency, or phase differences, are noted, and the signal
intensity and phase differences are recorded to create PHD.
Phased array A group of antenna elements in which the relative phases of the respective signals
feeding the elements are varied in such a way that the main beam of the array is
steered in a desired direction.
Photometry Measurement of the intensity of light emitted from or reflected by an object.
Pitch Vertical rotation of a sensor platform in a “nose up and down” fashion.
Pixel Picture element, the smallest element of a digital image.
Polar orbit A 90-degree inclination orbit, which crosses the equator moving directly north or
south and crosses directly over the poles.
Polarimetric A synthetic aperture radar that is capable of transmitting and/or receiving multiple
SAR polarizations.
Polarimetry The measurement and interpretation of the polarization of transverse waves, most
notably electromagnetic waves such as radio waves and light.
Polarization Orientation of the electric vector in an electromagnetic wave. In the RF bands,
polarization is established by the antenna, which may be adjusted to be different on
transmit and on receive.
Precision A measure of the detail in which a quantity is expressed.
Preprocessing In IMINT, making radiometric or geometric corrections before the main data analysis
and extraction of information are done.
Product The practice of dismantling commercial products or materiel of intelligence interest
teardown for detailed exploitation.
Propagation The movement of energy in the form of waves through space or other media.
Pulse A group of waves with a distribution confined to a short interval of time. Such a
distribution is described by its time duration and its amplitude or magnitude.
Pulse A technique used in radar and sonar to improve the range resolution and signal-to-
compression noise ratio of the sensor, by modulating the transmitted pulse.
Pulse repetition Rate of recurrence of the pulses transmitted by a radar.
frequency (PRF)
Pulse repetition The time interval between successive pulses transmitted by a radar.
interval (PRI)
Pulse train In ELINT, a processing technique for separating incoming radar pulses and assigning
deinterleaving them to specific radar targets.
Pushbroom An imager that makes use of the motion of a detector array along the ground; the
imager imaging effect resembles the bristles of a broom being pushed along a floor.
Quick reaction A USAF program designed to suspend normal contract procedures in order to get a
capability (QRC) weapons system or subsystem into the field rapidly.
Radar Electromagnetic sensor characterized by transmitting a signal and receiving the
reflection from a target; the acronym is derived from radio detection and ranging.
Radar cross- Measure of radar reflectivity, expressed in terms of the physical size of a
section (RCS) hypothetical perfect sphere that would give rise to the same level of reflection as that
observed from the sample target.
Radar Intelligence information derived from data collected by radar.
intelligence
(RADINT)
Radar resolution A volume defined by range and angular resolution for a radar.
cell
Radiation Act of giving off electromagnetic energy.
Radio frequency The use of RF signals (generally microwave) to illuminate a target and collect audio
flooding modulations on the signal reflected from the target.
Radiometer A passive sensor that receives an records the electromagnetic energy that is naturally
emitted from objects.
Radiometric An EM sensor that both creates an image and measures the intensity of received
imager energy in each pixel of the image.
Radiometric The ability of a sensor to distinguish different levels of signal intensity.
resolution
Range Line-of-sight distance, usually between a sensor and its target.
Range resolution In radar, this is the resolution characteristic of the range dimension. Range resolution
is fundamentally determined by the radar bandwidth.
Real time The absence of delay, except for the time required for the transmission by
electromagnetic energy, between the occurrence of the event or the transmission of
data, and the knowledge of an event, or reception of the data at some other location.
Contrasts with near real time, which has an additional delay.
Reconnaissance Periodic observation of a target area; contrast with surveillance.
Reference An EM signal from a known location, used as a reference to reduce the geolocation
emitter error of the desired target signal.
Reflected The main infrared component of the solar radiation reflected from the earth’s surface.
infrared
Reflective band The UV, visible, near IR (NIR), and short wavelength IR (SWIR) bands.
Reflectivity Property of illuminated objects to reradiate a portion of the incident energy.
Regional In intelligence, maintaining awareness of opportunities and threats to national
coverage interests in a specific geographical region.
Regional wave A seismic wave that is sensed relatively close to its source. Compare with teleseismic
waves, which are sensed at long distances.
Remote sensing Sensing, primarily from the electromagnetic spectrum, that is done at long distances
(on the order of tens to thousands of kilometers).
Resolution The ability of a system to differentiate two signatures—a unit of granularity.
Resolution cell A three-dimensional volume surrounding each point in a scene. Two separate targets
located in the same resolution cell cannot be distinguished.
Retrograde orbit A satellite orbit having more than 90 degrees inclination. The satellite moves in the
opposite direction from the earth’s rotation.
Revisit time The time that elapses before a collection asset can collect against a target for a
second time. This is also called revisit period.
Roll Rotation of a sensor platform around the flight vector, hence in a “wing up or down”
direction.
Rootkit Software code designed to take control of a computer while avoiding detection.
Roughness In imagery, the variation of surface height within an imaged resolution cell. A
surface appears “rough” to illumination when the height variations become larger than
a fraction of the EM wavelength.
S band The two microwave radar bands between 2300 and 2500 MHz and between 2700
and 3700 MHz.
S wave In seismic sensing, a shear (transverse) wave created by earthquakes.
Safe house In intelligence, a residence, hotel room, or similar facility used to conduct
clandestine meetings.
SAR Using two antennas on a SAR platform or two SARs flying in formation to receive
interferometry independent images of a target. The two images can be processed to detect moving
targets or for terrain mapping.
Scanner A sensor with a narrow field of view that sweeps over the terrain to build up and
produce a two-dimensional image of the surface.
Scene The ground area observed by a sensor.
Seismic sensing Detecting sound that travels through the earth. See seismic waves.
Seismic waves Waves that travel through the earth (for example, as a result of an earthquake or
explosion).
Seismometer A type of microphone used to sense teleseismic waves.
Shadowing In SAR, a region hidden behind an elevated feature in the scene that shows up as
black on the SAR image. This region is not illuminated by the radar energy and thus is
also not visible in the resulting radar image.
Signal-to-noise Quantitative basis for comparing the relative level of a desired signal to an unwanted
ratio (SNR) element such as noise. SNR can also be defined as the ratio of the power in a desired
signal to the undesirable noise present in the absence of a signal.
Signals A category of intelligence comprising communications intelligence (COMINT),
intelligence electronic intelligence (ELINT), and foreign instrumentation signals intelligence
(SIGINT) (FISINT).
Signature A set of distinctive characteristics of persons, objects, or activities that result from
processing of collected intelligence.
Signature library A database of signatures associated with a specific person, activity, or class of
objects so that when a signature is identified, it can be associated with a specific
person, phenomenon, object, or class of objects in the database.
Single-source An analytic product produced by a collection organization that relies primarily on its
analysis collection; COMINT, open source, and imagery analysis are examples.
Smearing In SAR, image distortion caused by a target accelerating toward or away from the
radar.
Sniffers Software programs or human administrators that search for unauthorized access to
computers and networks.
Sound A graph of the intensity versus frequency of sound, used in voice recognition.
spectrogram
Sound A network of hydrophone arrays mounted on the seafloor throughout the Atlantic
surveillance and Pacific oceans. Now part of the integrated undersea surveillance system (IUSS).
system (SOSUS)
Space object A combination of techniques used to obtain additional information about satellites,
identification reentry vehicles, and space debris.
(SOI)
Spatial accuracy The accuracy of a sensor’s location of a target on the earth or in space.
Spatial coverage A measure of the area on the earth’s surface or the volume of space that a sensor can
view in a given time.
Spatial filtering A processing technique used to enhance (or suppress) specific spatial patterns in an
image.
Spatial Ability of a sensor to resolve or separate two objects spatially, usually stated as a
resolution measure of distance on the ground.
Special access A term used by the DoD and the intelligence community to refer to highly classified
program (SAP) programs, usually protected by special classification compartments; also known as a
black program.
Specific emitter Also known as fingerprinting, a processing technique for identifying RF emitters
identification based on unique features of their signals.
Spectral A measure of the accuracy with which a sensor can determine the frequency or
accuracy wavelength of a signal.
Spectral A measure of the amount of the electromagnetic spectrum that a sensor can observe.
coverage
Spectral A spectral signature created by thermal emissions from a target.
emissivity curve
Spectral imager A set of imaging radiometers, each operating at a different wavelength and thereby
creating many simultaneous images of a scene.
Spectral The ability of a sensor to distinguish among energies of varying wavelengths emitted
resolution by or reflected from a target.
B
Backdoors, 126, 127, 136, 139
Back end management of collection, 448, 461–462, 479
Backscatter, 304
Baidu Blogs, 132
B-29 aircraft, 443
Ballistic coefficient (beta), 296
Ballistic missiles, 246, 279, 283, 295
FISINT and, 362–364
Barron’s, 24
Baseline, 19–20
Basic encyclopedia, 19, 20
Battlefield
acoustics, 385–386, 392
dissemination, 108–109
Begin, Menachem, 415
Behavioral sensing, 417, 424, 425, 428
Belarus, 143
Belenko, Victor, 437–438
Bhangmeters, 248, 256
Bias
systemic, 21
translation, 32–34
Bin Laden, Osama, 47–8, 73, 109, 155
medical sampling and, 419–420
Biological agents, 408, 425
Biological intelligence, 413, 427–428
behavioral sensing, 417, 424, 425, 428
biological sampling and sensing in, 414–15, 418, 424
biometrics in, 421–424, 424–425, 427–28
collection, 418–424
dissemination, 425–426
function, 413–417
medical and psychological profiling in, 421
medical sampling and sensing in, 415, 418–421, 427
planning, 417
process, 417–426
processing, exploitation, and analysis, 424–425
structure, 426–427
Biological sampling and sensing, 414–415, 418, 424
Biometrics, 60, 421–24, 427–28
processing, 424–425
sampling and sensing, 415–417
signatures, 415
structure, 426–427
Bistatic radar, 289
Black-body, 252
Black Boomerang, 27, 74
“Black Chamber,” 91
Blackmail, 54, 55
Black programs, 465
Blake, George, 56
Blitz collection strategy, 456–457
Blogs, 39, 132
Blogspot, 132
Botnet, 130
Boundaries, managing across, 462–468
Bribery, 55
Britain. See United Kingdom
British Broadcasting Company (BBC), 23, 27–28, 37, 40
Bruneval Raid, 434–435
Brush passes, 56–57
“Bugs,” 92
Buildings and underground facilities monitoring, 378–379
Bulk communication channels, 102
BUR radar, 204
Burst transmissions, 92–93
C
Cable, 99–100
Calibration, 262
points, 226
Cambodia, 420–421
Cameras, framing, 223–224
Camouflage and foliage penetration, 304–305
Canada, 59, 110, 130
Case officers, 19, 51–52
Catalogs, space, 238
Cell phones, 58, 95, 107, 115, 344–346
as RFID tags, 355
Centers for Disease Control and Prevention, 418
Central Intelligence Agency (CIA), 20, 22, 40, 77, 158, 463
Air America and, 61
biological intelligence and, 426
cyber collection and, 141
medical sampling and sensing, 415
moles in, 64
National Clandestine Service (NCS), 75
satellites used by, 58
surveillance by, 63
Centralized communications structure, 112
Centralized intelligence collection, 8–11
Chain Home radars, 278
Change detection, 304, 322–325
Charge-coupled device (CCD), 218–219, 223
Chemical sensing and materials sampling, 397–398, 402–404, 409–410
Chemical signatures, 154
Chemical warfare, 90, 267–268
Chemical Weapons Convention, 403
Cheng, Philip, 62
Chennault, Claire L., 61
China, 56, 57, 82, 158
biological intelligence about, 414
bribery in, 55
coercion in, 55
commercial espionage and, 49–50
cyber collection and, 123–125, 141
dissemination of information by, 38
foreign and domestic intelligence agency, 77, 78, 80–81
front companies used for technology and materiel acquisition by, 62
open source intelligence and, 22–23, 33, 36
satellites, 189, 198
staging for elicitation in, 68
supply chain contamination and, 138–139
surreptitious entry in, 64
Chirped pulse, 307, 329–330
Chisholm, Janet, 56
Chromatography, 423
Churchill, Winston, 106
CIA. See Central Intelligence Agency (CIA)
Cipher Bureau, 91
Ciphers, 51
Civil War, U. S., 46
Clandestine collection, 24, 51–59, 81–84
biometrics, 416
case officers, 51–52
clandestine services, 14, 19, 50, 51
close-in, 204–205, 207
compared to overt collection, 75–76
cover for, 60–61
double agents and moles in, 63–64
exit strategy, 59
front companies in, 61–62
issues in, 64–66
legality of, 65
of materiel, 435–436
recruitment process, 52–56
running the agent in, 56–58
spotting in, 52–53
structure of, 80–81
supporting, 59–64
surreptitious entry and, 64
surveillance and countersurveillance in, 62–63
technical intelligence, 159
timeliness of, 65–66
tradecraft, 50–51, 83
See also Overt collection
Close-in clandestine collection, 204–205, 207
Cobra Dane radar, 290–291
Cobra Judy radars, 291
Cobra King radar, 291–292
Cobra Mist radar, 286
Code talkers, 96
Coercion, 54, 55
Coherent change detection (CCD), 323
Coherent EM signals, 285
Cold War, the, 21–22, 28, 36, 40
collection priorities, 453
decentralized communications structure during, 112–113
dissemination during, 110
human intelligence during, 46, 50
illegals used in, 60
liaisons during, 70, 71
motivation for agents during, 53–54
national intelligence priorities and, 449–450
plant visits during, 69
radio frequency flooding during, 94
satellite communications during, 98
walk-ins and, 53
Collaborative collection strategies (CCS), 455–56
Collaborative communications structure, 7–8, 112
Collection platforms. See Platforms, collection
Color, false, 262–263
Commercial communications intelligence, 114
Commercial human intelligence, 48–50, 79
Communications intelligence (COMINT), 2, 3, 8, 18, 50, 114–118, 333–334
access and, 100–101
analysis, 105–108
back end management of collection, 461
cable and, 99–100, 116
collection, 101
collection strategies, 455
commercial, 114
cryptanalysis in, 102–105
customers, 9
defined, 89
dissemination, 108–111
function, 90–91
high-capacity communications systems and, 98
high frequency (HF) communications and, 97
microphones and audio transmitters, 92–93
microwave radio relay and, 98, 116
process, 92–111
process evaluation, 476
processing, 101–108
push-to-talk, 96
remote acoustic monitoring, 93–94
satellite communications and, 58, 97, 98–99, 116
sources, 9–10
structure, 111–114
supporting operational planning, 91
targeting, 90, 92–100
telephone surveillance, 94–96
tip-off sources, 39, 109–110
underwater sound, 96–97
World Wide Web and, 26
Compartmented stovepipes, 465–466
Competitive intelligence, 23–24
Comprehensive Nuclear Test Ban Treaty, 391
Compromise and espionage, 54
Computer network attack (CNA), 122, 124
See also Cyber collection
Computer network exploitation (CNE), 123, 124, 125, 126–132
See also Cyber collection
Conference proceedings, 28
Conrad spy ring, Clyde, 46
Content analysis, 36–37
Contrast enhancement, 229, 258
Convergent collection, 455
Copyright issues, 38, 39
Coriolis satellite, 258
Corona satellite, 217, 223
Corporate defectors, 72–73
Counternarcotics. See Narcotics
Countersurveilliance and surveillance, 62–63, 83
Counterterrorism. See Terrorism and counterterrorism
Cover, 60–61
Covert communications (COVCOM), 57
C radar band, 292
Cratology, 238
Credibility and authenticity of open source intelligence, 31
Critical mass, 10
Cross-track scanners, 221–222, 253
Cryptanalysis, 102–105, 116
Cuba, 37, 46, 53, 63, 238, 449
Cuban Missile Crisis, 37, 46, 238
Currency of open intelligence, 31
Customer expectations, 468–471
Customers, intelligence, 9
Customer vulnerability, 3
Cyber collection, 2, 26, 50, 143–145, 150
agent.btz infection, 133–134
collecting emanations in, 139–140
against commercial enterprises, 143
complexity, 122
against cyber crime, 142–143
defined, 121
direct access to computer or intranets and, 132–133
Flame and, 135–136
function, 123–126
Gauss and, 136–137
human error and, 122
mindset, 122
structure, 140–143
Stuxnet and, 125, 134–135
supply chain contamination and, 137–139
See also Computer network attack (CNA); Computer network exploitation
(CNE)
D
Dangles, 54
Databases, online, 26–27, 29–30
Data cubes, 269–270
Dead drops, 57
Decentralized communication structure, 112–113
Decentralized intelligence collection, 8–11
Deception and signaling, 25, 48
Defectors, 72–73, 81
Defense Intelligence Agency (DIA), 40, 53
Delmer, Sefton, 27
Denmark, 110
Department of Agriculture (USDA), 67
Department of Defense (DoD), 40, 78–79, 130, 133–134
all-source collection management, 460
functional management of stovepipes, 468
materiel acquisition and exploitation by, 426, 427, 444–445
overt materiel acquisition by, 433
Department of Homeland Security (DHS), 40, 77, 141, 355
Descending passes, 192
Detainees and prisoners, 73–75, 82
Dialog, 26
Digest of Foreign Broadcasts, 27
Digital images, 105
Diplomatic immunity, 67, 82
Direction-finding (DF) systems, 344–346
Director of central intelligence (DCI), 449
Director of national intelligence (DNI), 449, 465
Disguise, 63
Displacement, target, 319
Dissemination, 38–39
acoustic and seismic sensing, 390–391
battlefield, 108–109
biological intelligence, 425–426
communications intelligence, 108–111
materials intelligence, 407–408
materiel acquisition and exploitation, 444
nonliteral collection, 156–157
optical imaging, 237–238
passive RF, 366–367
radar data, 298–299
radiometric and spectral images, 268–270
synthetic aperture radar data, 328
DNA, 154
Doctors Without Borders, 29
Doppler effect, 310, 327–328
Double agents, 63–64
Dow Jones, 24
Drive-by download site, 128
Drug Enforcement Administration (DEA), 40, 67, 77, 113–114
Drugs, illegal. See Narcotics
Dubai, 62
Dulles, Allen, 67
Dumpster diving, 49, 133
Dun & Bradstreet, 24
DuPont, 73
Duqu, 125, 135, 136
Dwell time, 222
Dykes, Dustin, 121
E
Earth imaging, 212
Earth Observing-1 (EO-1) satellite, 261
Economic analysis and open source intelligence, 21–22
Edge enhancement, 229
Ego and espionage, 54
Egypt, 111, 133
Electromagnetic pulse (EMP), 337–338
Electromagnetic (EM) spectrum, 153, 154, 160, 248–249, 271
radar function and, 281–282
temperature and, 251–252
Electronic intelligence (ELINT), 2, 3, 5, 13, 50, 158, 367
intelligence priorities and, 448
operational, 335–336, 339–340, 356–357, 359–360, 367
passive RF, 333, 334–335, 339–340
processing, exploitation, and analysis, 358–359
requirements, 451
technical, 336, 360–361
transition to operational collection system, 474
Elicitation, 51, 66–68, 83
interrogation as, 72–75
Email, 37, 132, 143
Emanations, 139–140
Émigrés, 72–73
Emissivities, 252, 263
Encryption, 58, 91
cryptanalysis, 102–105, 116
England. See United Kingdom
Enhancement, image, 229–230, 258
Escobar, Pablo, 47, 95–96
Espionage. See Clandestine collection
Evaluating collection, 475–477
Exfiltration of agents, 59
Exit strategy for agents, 59
Exploit, 128
Exploitation
acoustic and seismic sensing, 385–390
biological intelligence, 424–425
image, 230–237, 241
materials intelligence, 405–407
materiel acquisition and, 436–443
passive radio frequency (RF) sensors, 358–366
radar data, 295–298
radiometric and spectral images, 264–268, 272–273
SAR polarimetric processing and, 325–326
signature, 154–156
synthetic aperture radar, 316–328
F
Facebook, 39, 53
Face-to-face meetings with agents, 56
Facial features, 154
microexpressions and, 424
recognition, 422–423
Factiva, 26
Factory markings, 441
Falklands War, 202–203
False color, 262–263
False flags, 55, 75
Falun Gong, 33, 124, 125
Far infrared band, 251
Fax communications, 102
FBI. See Federal Bureau of Investigation (FBI)
Federal Bureau of Investigation (FBI), 62, 67, 77
cyber collection and, 141, 142
supply chain contamination and, 139
surveillance by, 63
Fellers, Frank, 111
Fiber optic cable, 99–100, 101, 116
Field of regard, 219
Field of view (FOV), 219–220, 227–228
instantaneous, 221–222
Filtering, spatial, 229
Finfisher, 133
Fingar, Tom, 450
Fingerprints, 154, 416
Fisher, Vilyam Genrikhovich, 60
“Five Eyes” relationship, 110–111
Flame, 135–136
Fluidics, 93
F number, 217
Focal length, 216–219
Focal plane, 215
array, 218–219
Foliage and camouflage penetration, 304–305
Foot and vehicle traffic monitoring, 378
Foreign Broadcast Monitoring Service/Intelligence Service (FBIS), 27–28,
39–40
Foreign instrumentation signals intelligence (FISINT), 8, 50, 333, 334, 336–337,
340, 357, 367
missile launch sequence and, 362–364
processing, exploitation, and analysis, 361–366
using multipath TDOA to determine target altitude and, 364–366
Foreign Intelligence Requirements, Categories, and Priorities (FIRCAP) system,
449
Foreign versus domestic human intelligence, 76–78
Forensics, nuclear, 396–397
Forward-looking infrared (FLIR) systems, 251
Foxbat exploitation, 437–439
Framing cameras, 223–224
France, 48, 49–50, 64, 239, 259
cyber collection and, 123, 124
manned balloons used by, 187
optical imaging by, 239
satellite communications and, 98–99
satellites, 189
Frequency difference of arrival (FDOA), 351–352, 353–354
Frequency division multiplexing, 362
Frequency hopping, 58
Frequency-independent antennas, 344
Frequency resolution, 344
Front companies, 61
Front end management of collection, 447–448, 478
all-source analyst role, 457–458
collection management tools, 459–461
collection priorities, 452–453
intelligence priorities in, 448–450
priorities, 452–453
probing strategy, 457
requirements for, 451–452
strategies, 453–457
swarm, surge, or blitz collection strategy, 456–457
tasking, 458–459
Function
acoustic and seismic sensing, 374
biological intelligence, 413–417
communications intelligence, 90–91
cyber collection, 123–126
human intelligence, 45–50
literal collection, 4–5
open source intelligence, 18–25
optical imaging, 212–213
passive radio frequency (RF) sensors, 334–339
radar, 278–280
radiometric and spectral imaging, 246–248
synthetic aperture radar, 303–305
Functional management of stovepipes, 468
G
Gain, 342
Gambit satellite, 217, 219, 223
Gamma International, 133
Gamma ray detectors, 400
Gamma spectrometry, 406
Gangs, 23
Gauss, 136–137
General Communications Headquarters (GCHQ), 7
General Motors, 72–73
Geneva Accords, 75
GeoEye-1 satellite, 217, 232–235, 239, 259
Geolocation, 338–339
accuracy, 353–354
acoustic and seismic sources, 384–385
angle of arrival and, 344–347
frequency difference of arrival and, 351–352
time difference of arrival and, 347–351
Geometry, imaging, 219–221
Geophones, 93
Geospatial intelligence (GEOINT), 13, 230, 468
Geostationary (GEO) satellites, 191, 192, 198, 207, 213, 226, 228
searches for satellites in, 235
Germany, 90, 109
commercial espionage and, 48
high frequency communications and, 97
hyperspectral imaging satellite, 261
liaisons with, 70
open source intelligence collection by, 27
satellites, 189
World War II, 27, 50
Gill, Yehudi, 66
Glavnoye Razvedyvatel’noye Upravleniye (GRU), 78
Global coverage, 19
Global Hawk, 200, 223, 312–313
Globalization, 40
Global positioning system (GPS), 348–349
Glomar Explorer, 435–436
Google, 132, 133, 239
Government Accountability Office (GAO), 234–235
Graves radar, 289
Gray literature, 28
Grazing angle, 195
Great Britain. See United Kingdom
Ground-based electro-optical deep space surveillance (GEODSS) system, 226
Ground-based space surveillance, 225–228, 241
Ground moving target indicator (GMTI), 305
Ground sites, 203
Group elicitation, 68
Gulf War. See Iraq
H
Hacking. See Cyber collection
Haiti, 426
Halsey, William, 103–104
Hand geometry, 423
Handheld Interagency Identity Detection Equipment (HIIDE), 423
Hanssen, Robert, 46, 53, 54, 64
Hard copy sources, 27
Haystack radar, 298
Herman, Michael, 3, 69, 159
Hexagon satellite, 217, 219, 223
High-capacity communications systems, 98
High frequency (HF) communications, 97
Highly elliptical orbit (HEO) satellites, 191, 198, 207, 213, 226, 227
searches for satellites in, 235
Hiss, Alger, 58
Hughes, Howard, 435
Human error and cyber collection, 122
Human intelligence (HUMINT), 2, 3, 8, 18, 81–84, 460
back end management of collection, 461
biometrics in, 416
changing targets of, 50
clandestine materiel and, 435–36
clandestine versus overt, 75–76
collection strategies for, 455–56
commercial, 48–50, 79
counterterrorism and counternarcotics, 47–48
cyber collection and, 141–142
deception and signaling in, 48
defined, 45
foreign versus domestic, 76–78
function, 45–50
law enforcement and, 48
literal collection, 5
managed across boundaries, 463
military support through, 45–47
military versus nonmilitary, 78–79
moles in, 64
open source intelligence and, 24–25, 28–29
political and economic support through, 47
process, 50–75
structure of, 75–81
tip-off sources, 39
See also Clandestine collection; Overt collection
Hussein, Saddam, 328
Hydrophone, 380
Hyperspectral images (HSI), 258, 259–261, 263–264
target identification for hyperspectral and ultraspectral signatures, 267–268
I
Iceland, 467
Ideology and espionage, 53–54
Igloo White sensors, 205, 376
Ikonos satellite, 260
Illegals, 60, 83
Imagery intelligence (IMINT), 3, 5, 8, 13, 14, 158, 460
image exploitation and analysis, 230–237
managed across boundaries, 463
NGA responsibility for, 7
open source, 28–29
process evaluation, 476
requirements, 451
See also Optical imaging; Radar(s); Radiometric and spectral imaging
Images
artifacts, 199–200, 317
digital, 105
enhancement, 229–230, 258
exploitation and analysis, 230–237, 241
false color, 262–263
interpretation scales, 232
libraries, 237–238
stereoscopic, 231–232
Imaging radars, 284, 296
Imhausen-Chemie, 90
Immunity, diplomatic, 67
Incidence angles, 314
Inclination, satellite orbit, 192
Incoherent change detection, 323
India, 111, 130, 132
satellites, 189
Infrared radiometers, 253–254, 271
Infrared signals (IRINT), 13
Instantaneous field of view (IFOV), 221–222
Institute of Electrical and Electronics Engineers (IEEE), 280
Integrated Collection Management (ICM), 460–461
Integrated undersea surveillance system (IUSS), 381
Intelligence Analysis: A Target-Centric Approach, 6
Intelligence collection
centralized versus decentralized, 8–11
customers, 9
literal, 4–11
of literal and nonliteral information, 1, 2 (figure)
management and strategy, 14–15
nonliteral, 11–13
processing, analysis, and dissemination, 10–11
sources, 9–10
Interferometers, 283, 346–347
International Committee of the Red Cross, 29
International stovepipes, 466–467
International Telecommunication Union (ITU), 280
Internet sources. See World Wide Web, the
Interpretation scales, imagery, 232
Interrogation, 72–75, 82, 84
Intranets, 132–133
Inverse synthetic aperture radar (ISAR), 298
Iran, 56, 59, 62, 449
cratology and, 238
cyber collection and, 125
Iraq, 57, 62, 70, 327–328, 449
biological sampling and sensing in, 415
interrogations in, 74
overt materiel acquisition in, 433–434
push-to-talk communications in, 96
thermal imaging of, 247
UAVs in, 200
Iris scanning, 422
Israel, 59, 64, 66, 80, 111, 256, 415
cable communications, 99
cyber collection and, 123, 124
foreign and domestic intelligence agencies, 77, 78
satellite communications and, 99
satellites, 189, 219
Italy, 69
Ivins, Bruce, 414
J
Jane’s (military publisher), 27, 233
Japan, 50, 90, 91, 421, 467
product teardown by, 438–439
satellites, 189
Johnson, Lyndon, 23
Joint Captured Materiel Exploitation Center (JCMEC), 433–434
Joint Surveillance and Target Attack Radar Systems (JSTARS) aircraft,
279–280, 327–328
Jones, R. V., 434
Journals, 28, 35, 39
K
Kaspersky Lab, 136
Kennan, George F., 94
Kennedy, John F., 37, 46
Key intelligence questions (KIQs), 449
Keystroke dynamics, 423
Keystroke loggers, 129
KGB, 64, 75, 78
chemical sensing and materials sampling, 403
cryptanalysis by, 103
decentralized communication structure, 112–113
liaisons, 71
Khrushchev, Nikita, 37
Korean War, 61, 95
Kuklinski, Ryszard, 53, 54
Ku Klux Klan, 78
L
Landsat 7 satellite, 259, 260
Language translations, 31–34, 39, 65–66, 105, 116–117
Laos, 420–421
Laser radar techniques, 94, 293–295
Laser signals (LASINT), 13
Law enforcement
communications intelligence, 91
human intelligence and, 48
interrogations by, 74
Layover, 317
L band, 290–291
Lebanon, 59
Lenin, Vladimir, 67
Levy, Walter, 22
Lewis, James A., 123
Lexis-Nexis, 26
Liaison, 69–72, 83
dissemination and, 110–111
Liberation Tigers of Tamil Eelam, 33
Libraries, 3–4
chemical signature, 407–408
imagery, 237–238
signature, 157, 160, 407–408, 462
spectral, 268–270
Libya, 71, 90, 230–231, 233, 449
Limited Test Ban Treaty, 400–401
Linear frequency modulation (LFM), 360
LinkedIn, 39
Literal collection
function, 4–5
process, 5–7
structure, 7–11
Literal information, 1, 2 (figure), 3
Literature intelligence (LITINT), 17
Lloyds of London, 24, 27
Locating and tracking targets, 151, 159
Lonetree, Clayton, 55
Long-range search radars, 283, 297–298
Long wavelength infrared (LWIR) band, 251, 271
Lonsdale, Gordon, 60
Lopez de Arriortua, J. Ignacio, 72–73
Low earth orbit (LEO) satellites, 190, 192, 195, 206–207, 214
ground-based space surveillance, 225–226
sun-synchronous orbits, 196
Van Allen radiation belts and, 197, 198 (figure)
Lowell, Francis Cabot, 69
Low probability of intercept (LPI) communications, 101, 343
Luciano, “Lucky,” 69
Lunik, 441–443
M
Mafia liaisons, 69–70
Magazines, 27, 28
Magnetic anomaly detector (MAD), 398, 404–405
Magnetic material sensing, 398, 410
Malaysia, 62
Management, intelligence collection, 477–480
accelerating RDT&E cycle in, 473
across boundaries, 462–468
all-source analyst role, 457–458
back end, 448, 461–462, 479
bringing new collection capabilities online in, 471–75
collection management tools, 459–461
compartmented stovepipes, 465–466
customer expectations and, 468–471
dealing with timeliness pressures in, 470–471
evaluation in, 475–477
front end, 447–461, 478
functional management of stovepipes, 468
intelligence priorities and, 448–450
international stovepipes, 466–467
knowledge of collection value in, 469–470
maintaining technological edge in, 472–473
organization stovepipes, 463–465
priorities, 452–453
probing strategy, 457
requirements, 451–452
strategies, 453–457
swarm, surge, or blitz collection strategy, 456–457
tasking, 458–459
technical stovepipes, 466
transition to operational collection system in, 474–475
Mao Zedong, 22
Marine Asset Tag Tracking System (MATTS), 355
Marjata (ship), 201–202
Materials intelligence, 395, 408–10
chemical sensing and materials sampling, 397–398, 402–404, 409–410
collection, 398–405
dissemination, 407–408
function, 395–398
magnetic anomaly detector, 398, 404–405
magnetic material sensing, 398, 410
nuclear material sensing and sampling, 396–397, 409
planning, 398
process, 398–408
processing and exploitation, 405–407
structure, 408
Materiel acquisition and exploitation, 12, 445
clandestine, 435–436
by commercial firms, 445
dissemination, 444
exploitation, 436–443
exploitation without acquisition and, 440–441
function, 431–432
overt, 433–435
performance testing in, 439–440
planning, 432–433
process, 432–444
product teardown in, 437–439
reverse engineering in, 443, 444 (figure)
structure, 444–445
using front companies, 61–62
Maui Space Surveillance System, 203–204, 226, 236–237
Measurements and signatures intelligence (MASINT), 8, 12, 13, 14, 460
RF, 333, 337–338, 340, 357–358, 366, 367
Medical sampling and sensing, 415, 418–421, 427
Medium earth orbit (MEO) satellites, 190–191, 207, 227
Metzner, Helmut, 47
MI-5 and MI-6, 63, 64, 77–78
Micro electro-mechanical systems (MEMs), 377–378
Microexpression, 424
Microphones, 92–93
Microsoft, 49, 239
cyber collection and, 128, 130, 135–136, 139, 141
Microwave
frequency block, 280
radiometers, 252–253
radio relay, 98, 116
SAR and, 321–322
Middle East, the, 135–136, 194
Arab Spring, 232–235
See also Egypt; Iran; Iraq; Israel; Syria
Mid-wavelength infrared (MWIR) band, 250–251, 271
Miles, Steven, 74
Military
Basic Encyclopedia (BE), 20
communications intelligence, 91, 115–116
human intelligence, 45–47
intelligence compared to nonmilitary human intelligence, 78–79
intelligence customers, 9
intelligence sources, 9–10
versus nonmilitary human intelligence, 78–79
open source intelligence, 22–23, 41
perceptions of open source collection, 18–19
performance testing, 439–440
product breakdown, 436–439
reverse engineering, 443, 444 (figure)
See also Materiel acquisition and exploitation
Military Power of the People’s Republic of China, The, 34
Military Thought, 28
Min, Gary, 73
Mitnick, Kevin, 122
Modus operandi, 156
Moles, 63–64
Molody, Colon Trofimovich, 60
Money and espionage, 53
Montes, Ana, 53
Morse code, 107, 423
Mossad, 77, 80
Motivations for espionage, 53
Moving target indicator (MTI), 305, 312–313, 327–328, 331
Mubarak, Hosni, 133
Multibounce, 318
Multifunction radars, 284–285
Multilateration, 348
Multiplexing, 361–362
Multispectral imaging, 258–259
target identification for multispectral signatures, 266
Myers, Gwendolyn, 53
Myers, Walter, 53
N
Nadir point, 192, 194
Narcotics, 397
human intelligence on, 47–48
Narrowband signals, 342–343
Natanz, 135
National Center for Medical Intelligence (NCMI), 414, 425, 426
National Geospatial-Intelligence Agency (NGA), 7, 48, 239, 460, 466, 468
National Imagery Interpretability Rating Scale (NIIRS), 232, 452, 454, 458
National Intelligence Coordination Center (NIC-C), 465
National Intelligence Priorities Framework (NIPF), 449–50, 451–52
National Intelligence Tasking Center (NITC), 464–465
National Photographic Interpretation Center (NPIC), 463
National Reconnaissance Office (NRO), 217, 219, 468
National Security Act of 1947, 449
National Security Agency (NSA), 7, 40, 41, 460
National Security Council (NSC), 450
National technical means (NTM), 189
National White Collar Crime Center, 142
NATO, 29, 38, 54
Nazi Germany, 27, 50, 70, 74
Near-infrared (NIR) band, 249–250, 271
Near-polar orbit, 192
Near real time intelligence, 3
Near Vertical Incidence Skywave (NVIS), 97
Netherlands, the, 48
Network analysis, 126–127
New collection capabilities, management of, 471–475
New signal search, 343–344
Newspapers, 21, 27, 37, 39
New York Police Department (NYPD), 77
New Zealand, 110, 467
Nigeria, 143
Nimitz, Chester, 103–104
Nitol, 139
Noble gases, 401
Noise, radio, 58, 93
Nolte, William, 9
Nonconstant RCS, 321
Nonflat terrain and SAR, 317–318
Nongovernmental organizations (NGOs), 29, 41, 69, 419
Nonliteral (technical) collection, 11–13
characterizing targets for, 151–152, 159
collection process, 152–153
defined, 149
dissemination, 156–157
exploitation in, 154–156
function, 150–152
libraries, 157, 160
locating and tracking a target for, 151, 159
planning, 152
process, 152–157
processing, 153–154
situational awareness, 150–151, 159
structure, 157–159, 464
Nonliteral information, 1, 2 (figure), 3
Non-literal material, 2
Nonofficial cover (NOC), 60–61, 83
Nonstationary targets and SAR, 318–321
North Korea, 124, 125, 449
Norway, 110, 201–202
Novaya Zemlya, 381
Nuclear attack debris, 406–407
Nuclear debris and radiation (NUCINT), 13
Nuclear forensics, 396–397
Nuclear material sensing and sampling, 396–397, 399–402, 406, 409
Nuclear testing, 383–384, 389–390
O
Object identification radars, 284
Ofeq satellite, 219
Ohkrana, 103
Olseon, Peter, 463
Olson, James, 53
Online databases, 26–27, 29–30
On-site nuclear sampling, 402
Open Handset Alliance, 133
Open Source Center (OSC), 40
Open source intelligence (OSINT), 2, 3, 8, 17, 41–42
analysis, 35–37
collection, 29–31
competitive intelligence and, 23–24
content analysis, 36–37
deception and signaling using, 25
dissemination, 38–39
economic analysis and, 21–22
function, 18–25
gray literature, 28
hard copy sources, 27
human sources and commercial imagery in, 28–29
hybrid structure, 40–41
maintaining global and regional coverage in, 19–20
online databases and, 26–27
perceptions of, 18–19
planning and identifying sources for, 26–29
plausible cover and, 24–25
political analysis, 20–21
process, 25–34
processing, 31–34
providing context and validation, 24
source analysis, 35–36
structure, 39–41
supporting specific analytic products, 20–24
validity, 30–31
World Wide Web and, 26
Operational ELINT (OPELINT), 335–336, 339–340, 356–357, 359–360, 367
Operation SHAMROCK, 99
Optical imaging, 211–212, 240–241
collection, 215–228
dissemination, 237–238
of earth, 212
function, 212–213
ground-based space surveillance, 225–228
image exploitation and analysis, 230–237, 241
imaging geometry and imaging platforms, 219–221
imaging sensors, 221–224
planning, 213–215
process, 213–238
processing, 228–230
structure, 239–240
system aperture, 215
system focal length, 216–219
video, 224
Optical intelligence, nonimaging (OPTINT), 13
Optical spectrum, 12, 248–254, 271
Oracle Corporation, 49
Orbital parameters, 235–236
Orbits, satellite, 189–195
cycle, 192
Overhead collection, 189
Overhead nonimaging infrared (ONIR), 255
Overhead Persistent Infrared (OPIR), 246
sensors, 254–256
Overt collection
elicitation in, 66–68, 83
interrogation in, 72–75, 82, 84
liaison in, 69–72, 83
of materiel, 433–35
plant visits for, 68–69
See also Clandestine collection
Over-the-horizon (OTH) radars, 278, 279, 285–288
Oxford Analytics, 27
P
Pakistan, 111, 155
Panchromatic imagery, 215
Pandemics, 414
Passive network analysis, 126–127
Passive radio frequency (RF) sensors, 333–334
collection, 340–357
dissemination, 366–367
electronic intelligence and, 334–336, 339–340, 356–357, 358–361
foreign instrumentation signals intelligence and, 336–337, 340, 357
function, 334–339
geolocation and, 338–339, 344–355
MASINT, 337–338, 366
planning, 339–340
process, 339–367
processing, exploitation, and analysis, 358–366
structure, 367
target signal trade offs, 341–344
Passive versus active sensors, 164
Patterns, 30, 155–156
Patton, George, 22
Pelton, Robert, 99
Penkovsky, Oleg, 46, 53, 54, 56
Pentagon, the, 106
People’s Liberation Army (PLA), 36
Performance testing, 439–440
Perigee, 191
Petraeus, David, 419
Phase coding, 360
Phased arrays, 282–283
Phase history data (PHD), 309, 316–317, 330
Pixels, 220–221, 269
Planning
acoustic and seismic sensing, 374
biological intelligence, 417
and exploitation, 432–433
materials intelligence, 398
nonliteral collection, 152
optical imaging, 213–215
passive radio frequency (RF) sensors, 339–340
radar, 280
radiometric and spectral imaging, 248
synthetic aperture radar, 305–306
Plant visits, 68–69
Platforms, collection, 187–188, 205–207
aerostats, 201
air and space surveillance systems, 203–204, 207, 212–213
aircraft and UAV, 189, 199–200, 207, 213–215
close-in clandestine collection and, 204–205, 207
ground sites, 203
remote sensing, 188, 205–206
satellite, 189–198, 206–207, 213, 215
ships and submarines as, 201–203, 207
surface surveillance, 204
synthetic aperture radar, 313–316
trade offs with RF collections sensors, 355–356
Platforms, imaging, 219–221
Plausible cover, 24–25
Polarimetric imagers, 257–258
Polarimetric processing and exploitation of SAR, 325–326
Polarimetric SAR, 313
Polar orbit, 192
Political analysis and open source intelligence, 20–21
Political and economic support through human intelligence, 47
Polygraphs, 55–56
Post, Jerrold, 415
Powell, Colin, 106
Power measurements, ELINT, 361
Preprocessing, remote sensing data, 229
Presidential Decision Directive 35 (PDD-35), 449
Priorities, intelligence, 448–450
Prisoners and detainees, 73–75, 82
Probing strategy, 457
Process, collection
biological intelligence, 417–426
communications intelligence, 92–111
cyber collection, 126–140
and exploitation, 432–444
human intelligence, 50–75
literal, 5–7
nonliteral (technical), 152–157
open source, 25–34
optical imaging, 213–238
passive radio frequency sensors, 339–367
radar data, 280–298
radiometric and spectral imaging, 248–270
synthetic aperture radar, 305–328
Processing
acoustic and seismic sensing, 385–390
biological intelligence, 424–425
communications intelligence, 101–108
materials intelligence, 405–407
nonliteral collection, 153–154
open source intelligence, 31–34
optical imaging, 228–230
passive radio frequency (RF) sensors, 358–366
radar data, 295–298
radiometric and spectral imaging, 261–264
synthetic aperture radar, 316–328
Proctor & Gamble, 49
Product teardown, 437–439
Project VENONA, 58
Propaganda, 74
Propagation, EM waves, 248
Psychological profiling, 421
Pulse compression, 307
Pulse repetition frequency (PRF), 342
Pulse repetition interval (PRI), 360
Pulse train deinterleaving, 359
Pushbroom imagers, 223
Push-to-talk, 96
P waves, 389–390
Q
Qaddafi, Muammar, 71, 233
Quickbird satellite, 260
Quick reaction capability (QRC), 473
R
Radar intelligence (RADINT), 284, 299
Radar(s), 164, 207, 277, 299–300
bistatic, 289
C band, 292
collection process and equipment, 280–295
cross-section (RCS), 284
dissemination, 298–299
frequency bands, 280–281
function, 278–280
imaging, 284, 296
laser, 94, 293–295
L band, 290–291
long-range search, 283, 297–298
mechanism, 281–283
multifunction, 284–285
object identification, 284
operating modes, 283–285
over-the-horizon, 278, 279, 285–288
planning, 280
process, 280–298
processing and exploitation, 295–298
S-bands, 289, 291–292
surface-wave, 287
tracking, 283–284
tracking and measurement of aerospace vehicles (RADINT), 13
UHF bands, 289–290, 305
VHF bands, 288–289, 305
vibrometry, 285
X band, 291, 292–293
See also Sensors; Synthetic aperture radar (SARs)
Radiation belts, 197, 198 (figure)
Radiation detectors, 12
Radio, 27, 39, 40, 115
covert communications using, 58
microphones and audio transmitters, 92–93
microwave, 98
Radio frequency (RF)
damage weapons, 358
flooding, 93–94
hopping, 58
identification (RFID) chips, 138, 354–355, 471
MASINT, 333, 337–338, 340, 357–358
radar and, 280–281
tagging and tracking, 354–355
unintended emissions, 358
See also Passive radio frequency (RF) sensors
Radiometers
bhangmeter, 248, 256
infrared, 253–254, 271
microwave, 252–253
Radiometric and spectral imaging, 270–273
collection, 248–261
defined, 245–246
dissemination, 268–270
exploitation and analysis, 264–268, 272–273
far infrared band in, 251
function, 246–248
hyperspectral and ultraspectral imaging, 258, 259–261
infrared radiometers, 253–254
long wavelength infrared (LWIR) band in, 251
microwave radiometers, 252–253
mid-wavelength infrared (MWIR) band in, 250–251
multispectral imaging, 258–259
near-infrared (NIR) band in, 249–250
optical spectrum and, 248–249
planning, 248
polarimetric imagers, 257–258
process, 248–270
processing, 261–264
short-wavelength infrared (SWIR) band in, 250
spectral libraries for, 268–270
structure, 270
target identification for multispectral signatures, 266
temperature and, 251–252
Range, signal, 93
resolution, 307–308
Real time signatures, 157
Recruitment of agents, 52–56
Redl, Alfred, 46
Reflectivity, 225
Regan, Brian, 57
Regional coverage, 19
Regional waves, 382–383, 389–390
Remote acoustic monitoring, 93–94
Remote sensing, 12, 188, 205–206
data collection, 215–228
data processing, 228–229
Remote versus close-in sensing, 164–165
Research, development, test, and evaluation (RDT & E) cycle, 472, 473, 475
Resolution, 164
frequency, 344
Retinal scanning, 422
Retrograde orbit, 192
Reverse engineering, 443, 444 (figure)
Revisit period, 194
Risk-taking with clandestine collection, 65
Rommel, Erwin, 22, 106, 111
Rootkit, 129
Rosenberg, Ethel, 58
Rosenberg, Julius, 58
Rusk, Dean, 37
Russia, 46, 56
cryptanalysis in, 102–103
cyber collection and, 123, 124
and exploitation by, 431–432
foreign and domestic intelligence agencies, 75, 77, 78, 80
high frequency communications and, 97
optical imaging by, 240
satellites, 189, 194
S
Safe house, 48
Sampling techniques, 68
Satellite communications, 58, 97, 98–99, 101, 116
Satellites
imagery interpretation and, 232–235
as imaging platforms, 195–196, 206–207, 213, 215
optical imaging using, 213, 215
orbital parameters, 235–236
orbits, 189–195
radar, 295–297
remote sensing using, 189
search for new, 235
as SIGINT platforms, 196–197
space environment and, 197–198
telescope focal lengths, 217
Sazhen-M radar, 295
S bands, 289, 291–292
Scanners, cross-track, 221–222, 253
Scent identification, 423
Schwartz, Peter, 68
Seismic sensing
intelligence, 387–390
See Acoustic and seismic sensing
Seismic signal or wave, 377
Seismometers, 381
Sensors, 12, 163–164
active versus passive, 164
close-in clandestine collection, 204–205
imaging geometry and imaging platforms, 219–221
OPIR, 254–256
types of imaging, 221–224
See also Optical imaging; Passive radio frequency (RF) sensors;
Radiometers; Remote sensing
September 11, 2001 terrorist attacks, 106, 414
Sequential collection, 455
Serbia, 46
Shadowing, 317
Shih, Martin, 62
Shin Bet, 64, 77
Ships and submarines, 201–203, 207
Short wavelength infrared (SWIR), 250
Siemens Corporation, 135
Signaling. See Deception and signaling
Signals intelligence (SIGINT), 5, 8, 14, 334, 460
aerostats used for, 201
agency responsibility for, 7
managed across boundaries, 463
satellites used for, 196–197, 206–207
ships and submarines used for, 202
surface surveillance, 204
Signal-to-noise ratio (SNR), 351
Signatures, 12, 153–154
analysis, 107, 117
biometric, 415
chemical, 397–398
collected by sensors, 163–164
exploitation, 154–156
imagery libraries, 238
libraries, 157, 160, 407–408, 462
nuclear materials, 399–402
real time, 157
seismic and teleseismic intelligence, 387–390
spectral libraries, 268–270
target identification for hyperspectral and ultraspectral, 267–268
target identification for multispectral, 266
Situational awareness, 150–151, 159
space, 212–213
Skype, 133
Sluzhba Vneshney Razvedki (SVR), 75, 78, 80
Smearing, 319–321
Smear reduction, 321
Sniffers, 127
Sniper attacks, 156
Social engineering, 133
Social networking, 23
computer network exploitation and, 131–132
spotting through, 53
targeting and 7, 39
See also World Wide Web
Sonars, 164, 380
Sonogram, 422
Sound spectrogram, 422
Sound surveillance system (SOSUS), 380–381
Source analysis, 35–36
Sources, intelligence, 9–10
South Africa, 256
Soviet Union, the, 21–22, 28, 36, 90
cable communications, 99
chemical sensing and materials sampling, 403–404
coercion in, 55
commercial espionage and, 49
cover for agents in, 60
cryptanalysis in, 103
Cuban Missile Crisis and, 46
decentralized communication structure, 112–113
Glomar Explorer, 435–436
human intelligence on, 50
liaisons with, 71
Lunik space vehicle, 441–443
motivation for espionage against, 53–54
nuclear testing, 383–384, 389–390
product teardown and, 437–439
radio frequency flooding and, 94
reverse engineering by, 443
satellite communications and, 98
supply chain contamination and, 138
walk-ins and, 53
Space
catalogs, 238
launch vehicles, 246
object identification (SOI), 236–237, 284
situational awareness, 212–213
Space-Based Infrared System (SBIRS), 255–256
Space surveillance, 212–213, 225
ground-based, 225–228, 241
processing and exploitation, 235
Spain, 45–46
Spatial filtering, 229
Special access programs (SAPs), 465
Specialized databases, 26–27
Specific emitter identification, 360
Spectral emissivity curves, 263
Spectral imaging. See Radiometric and spectral imaging
Spectral libraries, 268–270
Spectral response, 259
curves, 263
Specular (mirror-like) reflection, 364
Speech recognition systems, 102
Sponsorship, 31
Spot Image, 239, 259
Spotlight mode, SAR, 310–312
Spotting, 52–53
Spotting, word, 102
Spread spectrum coding, 360
Standen, Anthony, 46
Steel Eagle sensor, 205, 206 (figure), 376, 390
Steel Rattler sensor, 205, 376, 390
Steganography, 57–58, 104–105
Stereograph, 231
Stereoscopes, 232
Stereoscopic imagery, 231–232
Stovepipes
communications structure, 7–8, 112
compartmented, 465–466
functional management of, 468
international, 466–467
organizational, 463–465
technical, 466
“Stovepipe” versus collaborative structure, 7–8
Strip map imaging, 310–312
Structure
acoustic and seismic sensing, 391
biological intelligence, 426–427
clandestine human intelligence, 80–81
communications intelligence, 111–114
cyber collection, 140–143
literal collection, 7–11
materials intelligence, 408
materiel acquisition and exploitation, 444–445
nonliteral collection, 157–159
open source intelligence collection, 39–41
optical imaging, 239–240
passive RF, 367
radar intelligence, 299
radiometric and spectral imaging, 270
synthetic aperture radar, 328–329
Stuxnet, 125, 134–135
Submarines and ships, 201–203, 207
Sudan, 403
Suez crisis, 230
Suleiman the Magnificent, Sultan, 70
Sun-synchronous orbits, 195–196
Supply chain contamination, 137–139
Surface surveillance, 204
Surface-wave radars, 287
Surge collection strategy, 456–57
Surreptitious entry, 64
Surveillance and countersurveillance, 62–63, 83
air and space systems, 203–204, 207, 212–213, 225
ground-based space, 225–228, 241
processing and exploitation of space, 235
surface, 204
telephone, 94–96
video, 224
Swarm collection strategy, 456–57
S waves, 389–390
Sweden, 48, 70, 110
Switzerland, 67, 99
Synthetic aperture radar (SAR), 196, 200, 303, 329–331, 455
azimuth resolution and, 308
change detection using, 304, 322–325
data collection, 306–316
dissemination, 328
foliage and camouflage penetration using, 304–305
forming range of, 308–310
function, 303–305
identifying targets and tracking moving targets using, 305
imaging over water, 326–327
interferometry, 322, 324–325
moving target indicator, 312–313, 327–328, 331
nonconstant RCS and, 321
nonflat terrain and, 317
nonstationary targets and, 318–321
phase history data, 316–317
planning, 305–306
platform choice for, 313–316
polarimetric, 313
polarimetric processing and exploitation, 325–326
process, 305–328
processing, exploitation, and analysis, 316–328
range resolution and, 307–308
smearing and, 319–321
spotlight and strip map imaging, 310–312
structure, 328–329
target displacement and, 319
terrain mapping and characterization, 304
two-color multiview, 325
unquiet microwave environment and, 321–322
Syria, 71
Systemic biases, 21
Szady, Dave, 62
T
TacSat 3 satellite, 260
Taiwan, 124
Taliban, 23
Targets, 39
altitude determination, 364–366
characterizing, 151–152, 159
communications intelligence, 92–100
displacement, 319
identification and tracking moving, 305
identification for hyperspectral and ultraspectral signatures, 267–268
identification for multispectral signatures, 266
locating and tracking, 151, 159
moving target indicator (MTI), 305, 312–313, 327–328, 331
SAR and nonstationary, 318–321
signal trade offs, 341–344
Task Force 157, 79
Tasking of collection assets, 458–459
Teardown, product, 437–439
Technical collection. See Nonliteral (technical) collection
Technical ELINT, 336, 360–361
Technical stovepipes, 466
Technical surveillance countermeasures (TSCM), 63
Technology acquisition using front companies, 61–62
Telemetry, 337, 363
internals and externals, 362
Telephone surveillance, 94–96
Telescopes, 237, 240
aperture, 215
focal length, 216–219
Teleseismic sensing, 373–374, 381–384
intelligence, 387–390
Teleseismic waves, 382–383
Television, 27–28, 37, 39, 40
news, 21
Temperature and EM energy, 251–252
TEMPEST, 140
Tennyson, Alfred Lord, 104
Tentology, 230
Terminator condition, 214
Terrain mapping and characterization, 304
Terra satellite, 262
Terrorism and counterterrorism, 81, 106
airborne video and, 212
cell telephones used in, 95–96, 100
human intelligence on, 47–48
open source intelligence on, 23, 39
steganography and, 104–105
See also Bin Laden, Osama
Thermal imaging, 247, 254
region, 251
Three-dimensional (3D) imagery, 231–232
Tiffany’s, 5
Time difference of arrival (TDOA), 347–351, 353–354, 364–366, 384
Time division multiplexing, 362
Timeliness of intelligence, 3
pressures on, 470–471
Tip-off, 38–39, 109–110
Tolkachev, Adolf, 53
Tracking radars, 283–284
Tradecraft, 50–51, 83
Traffic
analysis, 107, 108, 117
monitoring, 378
Transition to operational collection system, 474–475
Translation, 31–34, 39, 65–66, 105, 116–117
TRASHINT, 49, 133
Trojan horse, 129, 136, 138
Tunisia, 233, 234
Tupolev, Andrei, 443
Twitter, 53, 131
Two-color multiview, 325
U
UHF radar bands, 289–290, 305
Ultra, 109
Ultra high frequency (UHF), 280
Ultraspectral images (USI), 258, 259–261, 263–264
target identification for hyperspectral and ultraspectral signatures, 267–268
Ultraviolet (UV) light, 245
laser radars and, 295
Underground facilities and building monitoring, 378–379
Underwater sound, 96–97, 379–381, 387
Unilever, 49
United Kingdom, 46, 110, 188, 467
Bruneval Raid, 434–435
commercial espionage and, 48–49
cover for agents in, 60
cyber collection and, 140
Falklands War, 202–203
MI-5 and MI-6 in, 63, 64, 75, 77–78
plant visits to, 69
radar used by, 278
spies for, 53–54
See also British Broadcasting Company (BBC)
United States, the
acoustic and seismic sensing, 391
air sampling by, 400–401
biometrics collection, 427
cryptanalysis in, 103
cyber collection and, 140–141
exploitation of materiel, 436–440
international stovepipes and, 467
liaisons with, 70–71
motivation for espionage against, 53–54
National Imagery Interpretability Rating Scale, 232
optical imaging by, 239–240
overt materiel acquisition by, 433–434
product teardown by, 437–439
radar used by, 278
satellites, 189, 194
UAVs, 200, 201
Unmanned aerial vehicle (UAV) and aircraft, 189, 199–200, 207, 212, 219, 239
acoustic and seismic sensing and, 376
foreign instrumentation signals intelligence and, 337
monitored by radar, 279
planning, 213–215
Unrestricted Warfare, 36
V
Validity, 30–31
Valley of death, 474–75
Value, knowledge of collection, 469–470
Van Allen radiation belts, 197, 198 (figure)
Vegetation, 266
Vehicle and foot traffic monitoring, 378
Vela satellites, 256
VERA-E, 349–351
Very high frequency (VHF), 280
Vetting of potential agents, 55–56
VHF radar bands, 288–289, 305
Vibrometry, 285
Victrex, 73
Video, 224
Vietnam War, 23, 61, 358, 376
high frequency communications during, 97
Igloo White sensor, 205
medical sampling and, 420–421
Visual magnitude, 225
Voice grade channels, 102
Voiceprints, 154, 421–22
Volkswagenwerk AG, 72–73
Voodoo-INT, 470
Vulnerability
analyst, 2–3
customer, 3
scanning, 127
zero-day, 129–130
W
Walker, John, 46, 53
Walker spy ring, 46
Walk-ins, 53
Wal-Mart, 5
Walsingham, Francis, 45–46
WarGames, 127
Warsaw Pact, 54
Water, SAR imaging over, 326–327
Waterboarding, 74
Wavelength, 153
Weapons of mass destruction (WMD), 81, 106, 457
Whiskbroom scanners, 221
White-collar crime, 23
Wide instantaneous bandwidth signals, 343
WikiLeaks, 7, 38, 47, 67
Wikipedia, 26
Windtalkers, 96
WMD commission, 18–19, 40
Word spotting, 102
World Factbook, 20
World Health Organization, 418, 425
World Trade Center, 106
World War I, 46, 67, 95
acoustic and seismic sensing during, 375
angle of arrival techniques, 384
high frequency (HF) communications during, 97
World War II, 22, 27, 40
black propaganda during, 74
code talkers used during, 96
communications intelligence during, 90, 91, 106
covert operations during, 61
cryptanalysis during, 103–104
dissemination during, 109, 111
human intelligence during, 50
liaisons during, 69
radar used during, 278
walkie-talkies used during, 96
World Wide Web, the, 26, 29–30, 41–42
content analysis and, 37
targeting and, 39
terrorist use of, 100
See also Cyber collection; Social networking
Worm (computer), 125, 129, 134–135
Wullenweber, 346
X
X radar band, 291, 292–293
X-ray detectors, 400
Y
Yahoo!, 132
Yardley, Herbert, 91
Yellow Rain, 420–421
Z
Zero-day vulnerability, 129–130
Table of Contents
Halftitle
Title
Copyright
Contents
Figures and Tables
Preface
Acronyms
1 Introduction
Part I. Literal Collection
2 Open Source Intelligence
3 Human Intelligence
4 Communications Intelligence
5 Cyber Collection
Part II. Noniteral Collection
6 Overview of Nonliteral Collection
7 Collection Sensors
8 Collection Platforms
9 Optical Imaging
10 Radiometric and Spectral Imaging
11 Radar
12 Synthetic Aperture Radar
13 Passive RF
14 Acoustic and Seismic Sensing
15 Materials Intelligence
16 Biological, Medical, and Biometric Intelligence
17 Materiel Acquisition and Exploitation
Part III. Collection Management and Strategy
18 Managing Intelligence Collection
Glossary
Index
Advertisement