Introduction
This essay examines two forms of intelligence collection, namely signals intelligence (SIGINT) and open source intelligence (OSINT), with a view to determining whether the collection methods can be ranked in terms of importance. To this end, this essay will describe SIGINT and OSINT, with a focus on outlining the relative advantages and disadvantages of each method. It will be shown that any attempt to 'rank' collection methods in terms of their importance is only productive insofar as it is necessary to effectively direct the most suitable collection method against an intelligence target. Moreover, it will be argued that OSINT has a uniquely significant, although not more important role, in serving as a foundation upon which all other collection methods can be based.
Signals intelligence (SIGINT)
A description of SIGINT
SIGINT is typically defined as consisting of three sub-types:
communications (COMINT) - e.g. phone or internet traffic;
electronic or non-communications (ELINT) - e.g. radar emissions; and,
Foreign Instrumentation Signals (FISINT) - e.g. emissions associated with the launching of missiles or satellites.1
More generally, SIGINT involves the collection and analysis of electromagnetic transmissions associated with communications, radars, and weapons systems of intelligence targets.2
Not specifically covered in the above definitions (which historically refer only to the collection of information 'in motion') is the increasingly popular technique of computer network operations (CNO), which involves the deliberate acquisition of information that is 'at rest' - in layman's terms, hacking.3
Advantages of SIGINT
SIGINT has a number of advantages over other forms of intelligence collection, incl...
... middle of paper ...
...arge proportion of the raw data is inaccurate, out of date, biased, or otherwise useless.13
Conclusion
From an analysis of the relative advantages and disadvantages of SIGINT and OSINT, it is evident that, for a particular intelligence requirement, one collection method may be portrayed as 'more important' than the other. However, in terms of the whole intelligence collection and production process, it is infinitely more helpful to assess collection methods with a view purely to directing towards a target the method most likely to produce results, rather than to take a comparative view that tries to establish which method, per se, is more important than another. Rather, it is becoming an increasingly accepted premise that all source collection and analysis is the best way to ensure the most accurate and unbiased intelligence products are provided to policy makers.
Joel Best’s Damned Lies and Statistics is a book all about recognizing statistics that are legitimate and others that are really quite horrible. The goal of this book is not that the average every day person be able to read a statistical table from a scholarly journal, but rather that anyone could personally value a statistic he or she may come across in a newspaper article or on a news program. Best was essentially effective in achieving his goal; however, he was effective to the point of overdoing his job of showing that there are bad statistics which give readers cause to evaluate them outside of hearing them on the news.
For the American intelligence community, George Washington is considered the father of intelligence. The introduction of the intelligence concept and its application in some missions during the early days of America helped America’s Founding Fathers to succeed against t...
In order to transform a local police agency into an intelligence-led organization, they go through several steps. The first, after strict training and funding is to task and coordination processes. The second is to make and develop the intelligence products to be used in the operations. Next is to begin the use of standardized training for all the people to be involved. Since some local agencies cannot afford to train every employee in this...
...these intelligence failures, more emphasis is now placed on the creation of intelligence products used on the battlefield. All possible enemy courses of actions are now red teamed in an attempt to produce a much accurate analytical product.
3. X-Band/Ground-Based Radars: These radar systems gather tracking information regarding the incoming warheads during the mid-course phase of the missile. This data is then sent to the BM/C2, which in turn is sent to the GBI for guidance to intercept the warhead.
"Radar during World War II." - GHN: IEEE Global History Network. N.p., n.d. Web. 16 Feb. 2014. .
As indicated on page 416 of the 9/11 report “The biggest impediment to all-source analysis-to a greater likelihood of connecting the dots-is the human or systematic resistance to sharing information.” In other words, success revolves around the ability of the IC connecting the dots. Regrettably Kramer (2005) believes that bureaucracies often get in the way by implementing a variety of mechanisms that tend to isolate the dots. The IC argued on several occasions that they were unable to share information because of vaguely written laws that were often misunderstood. As stated above, the information sharing barriers that existed prior to September 2001 had a long history b...
Intelligence has come a long way since the time around 1,000 B.C. as Egyptian hieroglyphs have revealed and will only continue to grow far into the future. The Intelligence community (IC) will run into challenges far into the future but over the next several years it will be budgetary restructuring/cuts, cyber security implementation, and preventing the proliferation of weapons of mass destruction because a transitional phase within the United States will impact intelligence operations. The intelligence community is likely to transition back to its pre-9/11 requirements thus hindering or withdrawing post 9/11 implementations and requirements.
The compiled information comes from a very small portion of the population in the USA and Canada, which could lead to bias responses as these people know they are being measured.
There is a very small risk that some of the data I collected could be
I can’t agree with you more that IMINT had great impacts on the Intelligence Community and U.S top policy makers. It is undeniable fact that IC has benefitted greatly from the IMINT. It is hard to say which collection method has the greatest effect like you said it can be personal opinion. Each collection method has its capabilities and limitations. Collected intelligence sources must be critically analyzed and must be credible to become actionable intelligence for the policy makers. Like you said, IMINT contributed great success for identifying high value targets during its military operation during the Operation Iraqi Freedom. However, we can’t rule out there are also limitations on IMINT. According to Kimberly Government Accountability
Intelligence collection and apprehension of criminals have occurred for many years; however, with the exception of the Federal Bureau of Investigation, these actions were performed by different organizations. Nonetheless, roles and responsibilities have changed since the attacks on September 11, 2001. Intelligence-led policing and the National Criminal Intelligence Sharing program were incorporated, and fusion centers were established to help gather intelligence from different levels of the government. Although law enforcement at the local, state, and tribal levels aid in intelligence collection, it is important to ensure that intelligence gathered to protect national security and law enforcement intelligence are kept separately. Even though law enforcement operations can strengthen intelligence operations and vice versa, complications can arise when the two actions are combined. Government agencies must also ensure that sensitive and secret information does not leak or is not compromised when sharing intelligence. Therefore the purpose is to describe intelligence and law enforcement operations, discuss the expectations of prevention and punishment, and discuss the benefits and consequences of combining law enforcement and intelligence operations.
For this assignment, I will analyze at least three different research methodologies that I would consider relevant to the information security in ambient intelligence and the proposed solution that I have formulated, noting the general limitations of your research study. After I have analyzed the three methodologies, I will choose one of the methodologies to use in the study, and state the reasons that I made the choice, citing research for support in your decision.
Signals Intelligence (SIGINT) has access to many traditional and non-traditional dynamic elements that provide superior capabilities to collect and monitor visual, seismic, and acoustic signatures of motorized vehicles. SIGINT is the only system that can be operational and maintainable in any type of climate and terrain, which provides an advantage over the United States’ (U.S.) adversaries. The process of obtaining the intelligence starts with the collection of any type of signal, whether it be infrared, electro-optical, or electronic. After the signals are collected, analysts encounter the tasks of cryptanalysis, transcription, traffic analysis, and translations of the enemy information systems; analyst then determine size, location, distance, and terrain features. The data is usually processed in overlays and graphic displays within the United States. End products are then populated into National databases for the use of the Intelligence Community. The increasing utilization of computers, the internet, satellites, sophisticated encryption, and cellular telephones have streamlined effective and accurate Human Intelligence (HUMINT); implementation of Signals Intelligence has became an important role to maintain superiority over adversaries.
...rue and lie. It depends on how it is used, collected and analyzed. Therefore, readers should understand what reliable statistics are. Yet, statistics are very important for researchers, scientists, students, employers and individuals to make decisions as well as to evidence any claims or scientific theories.