[Back] |
[Index] |
[Next] | USAF INTELLIGENCE TARGETING GUIDE AIR FORCE PAMPHLET 14- 210 Intelligence 1 FEBRUARY 1998 |
A3. 1. 1. HUMINT includes overt, sensitive, and clandestine activities and the individuals who exploit, control, supervise, or support these sources.
A3.1.1.1. Overt activities are performed openly without concealment. While some aspects may be classified, the overall activity is generally easily detected, or the sources are exploited in an open but discrete manner. Some overt HUMINT activities are: conventional programs for the interrogation of ÈmigrÈs, refugees, escapees, and prisoners of war; debriefing aircrews and legal travelers; and programs to exploit open publications.
A3.1.1.2. Sensitive activities fall between overt and clandestine. Because their disclosure would be detrimental to the best interests of the United States, they require special protection from dis-closure, as well as concealment of the sponsor's identity.
A3.1.1.3. Clandestine activities must be conducted so that both the existence of the operation itself and the identity of the sponsor are secret.
A3.1.2. Advantages of HUMINT:
A3.2. Signals Intelligence (SIGINT) . SIGINT is a category of intelligence comprising, either individ-ually or in combination, all communications intelligence (COMINT), electronics intelligence (ELINT), and foreign instrumentation signals intelligence, however transmitted. It is derived from foreign commu-nications and electronics signals in two principal categories: COMINT, which is derived from the inter-cept of foreign communications; and ELINT, which is derived from the analysis of foreign noncommunications and electromagnetic radiation emitted from other than nuclear detonations or radio-active sources.
A3.2.1. NSA is responsible for the US SIGINT program. Each military service has a service crypto-logical agency, operationally directed by NSA through the Central Security Service (CSS), to ensure missions are properly assigned and duplication of effort is avoided. In the Air Force, this mission is assigned to Air Intelligence Agency (AIA). The Army Intelligence and Security Command (INSCOM) and the Naval Security Group (NSG) make up the remaining agencies of the military NSA and CSS structure. The Director of NSA also serves as Chief of CSS.
A3. 2.2. SIGINT has many uses, but its application requires a thorough knowledge of the product. Order of battle depends heavily on correlation and analysis of COMINT and ELINT. Mission route planning requires current intelligence on enemy defensive positions and capabilities. Targets can be detected and located through airborne direction finding techniques. Intelligence concerning enemy operational plans may be obtained through signal analysis or cryptologic procedures. Confirmation of other types of intelligence can be made by targeting personnel with the aid of SIGINT reports. Finally, post strike or attack data and damage resulting from missions may also be obtained.
A3.2.3. Advantages of SIGINT:
A3.2.4. Limitations of SIGINT: 142
A3.3. Measurement and Signature Intelligence (MASINT) . MASINT is obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wave length, time dependent, modulation, plasma, and hydromagnetic) derived from sensing instruments other than those generally used for communica-tions, electronics intelligence, or imagery collection.
A3.3.1. MASINT includes but is not limited to the following disciplines:
A3.3.2. Telemetry Intelligence (TELINT) is technical information and intelligence information derived from the intercept, processing, and analysis of foreign telemetry and is a special category of signals intelligence. TELINT gathers quantitative data on foreign missiles and space and aerody-namic vehicles. TELINT and other foreign instrumentation signals (FIS) collection needs are expressed as MASINT requirements.
A3.3.3. The term MASINT refers to the above categories of special sensor disciplines. The term "measurement" refers primarily to data collected for the purpose of obtaining finite metric parameters. For the most part, the characteristics of collection instruments used are irrelevant to the data. Typical examples of data are reentry vehicle trajectory, beta, and drag history. The term "signature" refers pri-marily to data indicating the distinctive features of phenomena, equipment, or objects as they are sensed by the collection instrument. The signature is used to recognize the phenomena, equipment, or object when their distinctive features are detected.
A3.3.4. Advantages of MASINT:
A3.4. Unattended Ground Sensors (UGS). A3.4.1. The conflict in Southeast Asia brought about the development and use of this unique intelli-gence source. These sensors were developed using technology derived from sonobuoys used by the Navy for antisubmarine warfare (ASW) and from intrusion detectors developed for the Army. Sensor technologies are typically categorized as acoustic, seismic, magnetic, electromagnetic, or electro- opti-cal.
A3.4.1.1. Acoustic sensors sense the acoustic energy (sound waves) emitted by a potential target. They allow analysts to calculate the target's position by measuring the time of arrival of sound waves at several known sensor locations; to identify or classify targets based on the emitted acous-tic energy; or to monitor sounds or conversations.
A3.4.1.2. Seismic sensors detect or measure seismic disturbances generated by moving vehicles or personnel. They can be used to cue other, higher resolution sensors (for example, acoustic or electro- optical sensors) and identify or classify targets.
A3.4.1.3. Magnetic sensors detect changes in the ambient magnetic field caused by the movement or presence of metallic objects. Their range is extremely short, but they can be used to cue other, higher resolution sensors and to identify or classify targets.
A3.4.1.4. Electromagnetic sensors detect target emitted electromagnetic radiation. Such sensors depend on target self- emission, target motion, or conversion of mechanical disturbance into elec-tromagnetic radiation.
A3. 4. 1.5. Electro- optical sensors systems image potential targets to detect, locate, and identify them. The most common are unattended infrared (IR) ground sensors, although sensors detecting in the visible light end of the spectrum have also been investigated.
A3.4.2. Advantages of unattended ground sensors:
A3.4.3. Limitations of unattended ground sensors:
A3.4. 4. Unattended sea sensors can provide valuable support to tactical air forces conducting sea interdiction and reconnaissance or surveillance operations. Potential sea sensor roles, advantages, and limitations are generally the same as those for unattended ground sensors.
A3.5. Imagery. Collectively, imagery is the representation of objects reproduced optically or electroni-cally on film, electronic display devices, or other media. Imagery comes from visual photography, radar sensors such as sidelooking airborne radar (SLAR), infrared sensors, lasers, and electro- optics. While each sensor operates at different spectrum frequencies and each type of imagery has distinctive character-istics, the advantages and limitations of each are similar.
A3.5.1. Advantages:
A3.5.2. Limitations:
A3.6. Scientific and Technical (S& T) Intelligence . This is the product resulting from collecting, eval-uating, analyzing, and interpreting foreign scientific and technical information. It covers foreign develop-ments in basic and applied research and in applied engineering techniques; and scientific and technical characteristics, capabilities, and limitations of all foreign military systems, weapons, weapon systems, and materiel, the research and development related thereto, and the production methods employed for their manufacture
A3.6.1. Advantages:
A3.7. Open Source Literature . Newspapers, magazines, books, and foreign broadcasts make up the greatest volume of intelligence materials. Telephone directories, films, maps, and charts are also useful.
A3.7.1. Advantages:
A3.7.2. Limitations:
[Back] |
[Index] |
[Next] | USAF INTELLIGENCE TARGETING GUIDE AIR FORCE PAMPHLET 14- 210 Intelligence 1 FEBRUARY 1998 |