Sample records for humint imint sigint

  1. Pre-incident Analysis using Multigraphs and Faceted Ontologies (United States)


    intelligence (HUMINT), 5) open - source intelligence ( OSINT ) and 6) geospatial intelligence 1 . The analyst must access, parse, and correlate each of...The information comes in a range of classification levels from open - source human terrain data to highly classified and compartmentalized, and in...many types: 1) signals intelligence (SIGINT), 2) imagery intelligence (IMINT), 3) measurement and signature intelligence (MASINT), 4) human- source

  2. Recce NG: from Recce sensor to image intelligence (IMINT) (United States)

    Larroque, Serge


    Recce NG (Reconnaissance New Generation) is presented as a complete and optimized Tactical Reconnaissance System. Based on a new generation Pod integrating high resolution Dual Band sensors, the system has been designed with the operational lessons learnt from the last Peace Keeping Operations in Bosnia and Kosovo. The technical solutions retained as component modules of a full IMINT acquisition system, take benefit of the state of art in the following key technologies: Advanced Mission Planning System for long range stand-off Manned Recce, Aircraft and/or Pod tasking, operating sophisticated back-up software tools, high resolution 3D geo data and improved/combat proven MMI to reduce planning delays, Mature Dual Band sensors technology to achieve the Day and Night Recce Mission, including advanced automatic operational functions, as azimuth and roll tracking capabilities, low risk in Pod integration and in carrier avionics, controls and displays upgrades, to save time in operational turn over and maintenance, High rate Imagery Down Link, for Real Time or Near Real Time transmission, fully compatible with STANAG 7085 requirements, Advanced IMINT Exploitation Ground Segment, combat proven, NATO interoperable (STANAG 7023), integrating high value software tools for accurate location, improved radiometric image processing and open link to the C4ISR systems. The choice of an industrial Prime contractor mastering across the full system, all the prior listed key products and technologies, is mandatory to a successful delivery in terms of low Cost, Risk and Time Schedule.

  3. Women in the United States Marine Corps CI/HUMINT Community

    National Research Council Canada - National Science Library

    Reese, Jackson L


    The purpose of the researchers Masters of Military Arts and Science thesis is to explore the possibility of including women in the Marine Corps CI/HUMINT community without diminishing the overall unit...

  4. Coming in From the Cold ... War: Defense Humint Services Support to Military Operations Other Than War

    National Research Council Canada - National Science Library

    Becker, David


    ...) and theater commander in chiefs (CINCs) in military operations other than war (MOOTW). The examination included a study into the recent history of military HUMINT, and the Department of Defense's (DoD's...

  5. Does U.S. Army Humint Doctrine Achieve Its Objectives? What Have Iraq and Afghanistan Taught Us? (United States)


    OSINT Open Source Intelligence PIR Priority Intelligence Requirements PLDC Primary Leadership Development Course PME Professional Military...Exploitation (DOCEX/DOMEX) Analysis, Open Source Intelligence ( OSINT ), Military Source Operations and Interrogations.8 The Army employs HUMINT in a...analysis, and OSINT , although important, are traditionally thought of as less critical than Interrogations or Source Operations. While training does

  6. Task Force Report: Assessment of Nuclear Monitoring and Verification Technologies (United States)


    o Make  explicit  the  requirements  for,  and  improvements  needed  in,  HUMINTSIGINT, cyber,  OSINT , etc., to support monitoring and...environments.                                                             23 The potential for  OSINT  (open source intelligence) as a focusing step is...various  intelligence  collection  capabilities  (HUMINTIMINT,  MASINT,  OSINT ,  SIGINT, etc.) have historically played a  strong  role  in  the

  7. Intelligence Community Spending: Trends and Issues (United States)


    The Deputy Director CIA manages the CIAP. Funds CIA activities to include HUMINT and OSINT . The CIAP funds everything related to the CIA. It...Human Intelligence (HUMINT); Imagery Intelligence (IMINT); Measurement and Signature Intelligence (MASINT); Open Source Intelligence ( OSINT ); and

  8. Visualizing Host-Nation Sentiment at the Tactical Edge (United States)


    HUMINT) and open source intelligence ( OSINT ) become prioritized above more traditional intelligence based on signals (SIGINT) and electronic on HUMINT and OSINT . Soldiers as peacekeepers must manage multiple information assets and resources, often relying on local and international

  9. Signal Corps and Military Intelligence Officer Perceptions of a Multifunctional Branch Merger (United States)


    Ordnance Branch OPMS Officer Personnel Management System ORSA Operations Research—Systems Analysis OSINT Open Source Intelligence PME Primary...HUMINT), Geospatial Intelligence (GEOINT), and Open Source Intelligence ( OSINT ). The broad scope of what is expected from Military Intelligence...and assessment dimensions (SIGINT, MASINT, TECHINT, OSINT , etc.) It is recommended that the Military Intelligence Branch more accurately define which

  10. Broad Area Wireless Networking Via High Altitude Platforms (United States)


    Multiplexing ORS Operationally Responsive Space OSINT Open-Source Intelligence PTMP Point To Multi-Point PTP Point To Point QOS Quality Of...Intelligence (SIGINT), Measurement and Signature Intelligence (MASINT), Human Resources Intelligence (HUMINT), and Open-Source Intelligence ( OSINT ) [34

  11. The Information Barber Pole: Integrating White Information and Red Intelligence in Emerging Conflicts (United States)


    Preparation of the Environment OSINT open source intelligence PNP SAF Philippines National Police Special Action Force SFA Security Force Assistance...intelligence functions which include (but are not limited to) human intelligence (HUMINT), open source intelligence ( OSINT ), and signals intelligence (SIGINT...intelligence ( OSINT ) is designed to capture information that hasn’t traditionally been considered part of the overall intelligence estimate. White

  12. Making the Most of MASINT and Advanced Geospatial Intelligence (United States)


    SIGINT), human intelligence (HUMINT), open source intelligence , ( OSINT ), and measurement and signatures intelligence (MASINT). All sources progress...the underlying principles of MASINT technologies and the operators and analysts who have intelligence questions that MASINT sources may be able to...integrity, analysts should instead use these sources of MASINT in support of less time-sensitive intelligence problems. Through creative or

  13. Improving the All-Hazards Homeland Security Enterprise Through the Use of an Emergency Management Intelligence Model (United States)


    OSINT Open Source Intelligence PPD Presidential Policy Directive SIGINT Signals Intelligence SLFC State/Local Fusion...Geospatial Intelligence (GEOINT) from Geographic Information Systems (GIS), and Open Source Intelligence ( OSINT ) from Social Media. GIS is widely...Central Intelligence Agency is the federal agency most often associated with HUMINT collection. • Open - Source Intelligence ( OSINT )– OSINT

  14. Self-Development for Cyber Warriors (United States)


    Geospatial Intelligence (GEOINT), Human Intelligence (HUMINT), Open Source Intelligence ( OSINT ), Signals Intelligence (SIGINT) and Measurement and...from career fields with varying degrees of intersection with cyber warfare including: signals intelligence , all source intelligence , and...leverage them in support of cyber warfare operations. All Source Intelligence Ability to request, analyze, synthesize, and fuse intelligence from

  15. Integrated Air Surveillance Concept of Operations (United States)


    Intelligence (SIGINT) Human Intelligence (HUMINT) Measurement and Signature Intelligence (MASINT) Open Source Intelligence ( OSINT ) In...Office of Management and Budget OpsCon: Operational Concept OSINT : Open Source Intelligence OSTP: Office of Science & Technology Policy Pt–, all- source intelligence , law enforcement information and relevant open - source data from public and private sectors,

  16. Expanding the Use of Time/Frequency Difference of Arrival Geolocation in the Department of Defense (United States)


    Intelligence Center NIB non-interference basis OSINT open - source intelligence PLLS Precision Location and...SIGINT), measurement and signature intelligence (MASINT), human intelligence (HUMINT), and open - source intelligence ( OSINT ). Geospatial intelligence is...of bearing MASINT measurement and signature intelligence MOC mission operations commander MP mission planner MSA multi- source analyst MTO

  17. Expeditionary Forensic Support to Joint Force Commanders: What Changes or Considerations are Warranted? (United States)


    builders . Human Intelligence (HUMINT) and Signals Intelligence (SIGINT) could then also be prioritized and employed accordingly for optimal 8...responsibility for digital and multimedia forensics, and DIA responsibility for forensic intelligence activities and programs.31 The Army is also currently...aligning functional oversight of Forensics, Biometrics, Law Enforcement, Detainee Operations, and Physical Security 11 under one overarching

  18. Balancing Information Analysis and Decision Value: A Model to Exploit the Decision Process (United States)


    technical intelli- gence e.g. signals and sensors (SIGINT and MASINT), imagery (!MINT), as well and human and open source intelligence (HUMINT and OSINT ...Clark 2006). The ability to capture large amounts of da- ta and the plenitude of modem intelligence information sources provides a rich cache of...many tech- niques for managing information collected and derived from these sources , the exploitation of intelligence assets for decision-making

  19. Spartans in Darkness: American SIGINT and the Indochina War, 1945-1975. Series 6, Volume 7 (REDACTED) (United States)


    all colo- nial financial , industrial, and agricultural activi- ties. As elsewhere in Asia, the primary economic activity was agriculture and was...were mired in China, and no end to the fighting was in sight. Jiang Jieshi refused to surrender, and the war was bleeding Japan dry financially . CU...istration was perplexed by the Ngo family’s shenanigans in Saigon. In the previous month there had been rumors of a coup by Diem’s broth- er, Nhu. On 11

  20. Interactive analysis of geodata based intelligence (United States)

    Wagner, Boris; Eck, Ralf; Unmüessig, Gabriel; Peinsipp-Byma, Elisabeth


    When a spatiotemporal events happens, multi-source intelligence data is gathered to understand the problem, and strategies for solving the problem are investigated. The difficulties arising from handling spatial and temporal intelligence data represent the main problem. The map might be the bridge to visualize the data and to get the most understand model for all stakeholders. For the analysis of geodata based intelligence data, a software was developed as a working environment that combines geodata with optimized ergonomics. The interaction with the common operational picture (COP) is so essentially facilitated. The composition of the COP is based on geodata services, which are normalized by international standards of the Open Geospatial Consortium (OGC). The basic geodata are combined with intelligence data from images (IMINT) and humans (HUMINT), stored in a NATO Coalition Shared Data Server (CSD). These intelligence data can be combined with further information sources, i.e., live sensors. As a result a COP is generated and an interaction suitable for the specific workspace is added. This allows the users to work interactively with the COP, i.e., searching with an on board CSD client for suitable intelligence data and integrate them into the COP. Furthermore, users can enrich the scenario with findings out of the data of interactive live sensors and add data from other sources. This allows intelligence services to contribute effectively to the process by what military and disaster management are organized.

  1. The Combatant Commander and Effective Operational HUMINT: Lessons From the Double Cross System of World War II and the CJ2X of Operation Joint Guard (United States)

    2003-05-19> [27 March 2003]. 37 Ibid. 38 “Operation Overlord,” Saving Private Ryan Online...Security, (Washington, DC: 2002), 17; National Strategy for Combating Terrorism. Washington, DC: 2003. “Operation Overlord,” Saving Private Ryan Online

  2. New Perspectives on Intelligence Collection and Processing (United States)


    MASINT Measurement and Signature Intelligence NPS Naval Postgraduate School OSINT Open Source Intelligence pdf Probability Density Function SIGINT...MASINT): different types of sensors • Open Source Intelligence ( OSINT ): from all open sources • Signals Intelligence (SIGINT): intercepting the

  3. An Analytical Framework for Soft and Hard Data Fusion: A Dempster-Shafer Belief Theoretic Approach (United States)


    generated soft data, such as HUMINT (HUMan 1 2 INTelligence), OSINT (Open Source INTelligence) and COMINT (COMmunications INTelligence), are fundamentally...human intelligence (HUMINT), open source intelligence ( OSINT ), and communications intelligence (COMINT), which is human communications derived from...respectively). The sources correspond to selected intelligence disciplines described in [9]. HUMINT and OSINT sources provide mostly soft

  4. Practical Consideration Factors to Design Array Configuration of Direction Finding System for Airborne Signal Intelligence

    Directory of Open Access Journals (Sweden)

    Jong-Hwan Lee


    Full Text Available Airborne signal intelligence (SIGINT systems must be capable of locating radio signal sources. Direction finding (DF to support this capability is an important factor. There are some practical considerations to be taken when designing the array configuration of a DF system for airborne SIGINT systems. This paper summarizes the practical factors when designing the array configuration of the DF system for airborne SIGINT. In particular, it focuses on four areas: antenna consideration factors when installing the DF system for airborne SIGINT from a practical point of view, array configuration methods for airborne communications intelligence and electronic intelligence, and a numerical analysis to select the optimum antenna position for airborne SIGINT.

  5. An Analysis of the Influence of Signals Intelligence Through Wargaming

    National Research Council Canada - National Science Library

    McCaffrey, Charles


    Signals intelligence (SIGINT), information derived from the monitoring, interception, decryption and evaluation of an adversary's electronic communications, has long been viewed as a significant factor in modem warfare...

  6. Image intelligence online consulting: A flexible and remote access to strategic information applied to verification of declaration

    International Nuclear Information System (INIS)

    Chassy, A.F. de; Denizot, L.


    Commercial satellite imagery is giving International Institutions specialized Information Departments access to a great source of valuable intelligence. High resolution and multiple sensors have also led to a growing complexity of interpretation that calls for a greater need of consulting, verification and training in the field in order to make it eligible as an operational source of verification. Responding to this need, Fleximage is extending its Image intelligence (IMINT) training program to include a fully operational and flexible online consulting and training program. Image Intelligence (IMINT) Online Program, a new approach to acquiring IMINT expertise, supported by Internet technologies, and managed by a professional team of experts and technical staff. Fleximage has developed a virtual learning environment on the Internet for acquiring IMINT expertise. Called the IMINT Online Program, this dynamic learning environment provides complete flexibility and personalization of the process for acquiring expertise. The IMINT online program includes two services: Online Consulting and Online Training. The Online Consulting service is designed for the technical staff of an organization who are already operational in the field of image intelligence. Online Consulting enables these staff members to acquire pertinent expertise online that can be directly applied to their professional activity, such as IAEA verification tasks. The Online Training service is designed for the technical staff of an organization who are relatively new to the field of image intelligence. These staff members need to build expertise within a formal training program. Online Training is a flexible and structured program for acquiring IMINT expertise online

  7. Image intelligence online consulting: A flexible and remote access to strategic information applied to verification of declaration

    International Nuclear Information System (INIS)

    Chassy, A.F. de; Denizot, L.


    Commercial satellite imagery is giving International Institutions specialized Information Departments access to a great source of valuable intelligence. High resolution and multiple sensors have also led to a growing complexity of interpretation that calls for a greater need of consulting, verification and training in the field in order to make it eligible as an operational source of verification. Responding to this need, Fleximage is extending its Image Intelligence (IMINT) training program to include a fully operational and flexible online consulting and training program. Image Intelligence (IMINT) Online Program, a new approach to acquiring IMINT expertise, supported by Internet technologies, and managed by a professional team of experts and technical staff. Fleximage has developed a virtual learning environment on the Internet for acquiring IMINT expertise. Called the IMINT Online Program, this dynamic learning environment provides complete flexibility and personalization of the process for acquiring expertise. The IMINT online program includes two services: Online Consulting and Online Training. The Online Consulting service is designed for the technical staff of an organization who are already operational in the field of image intelligence. Online Consulting enables these staff members to acquire pertinent expertise online that can be directly applied to their professional activity, such as IAEA verification tasks. The IMINT virtual Consulting and Training services indicated above are made possible thanks to the latest in Internet-based technologies including: multimedia CD-ROM, Internet technologies, rich media content (Audio, Video and Flash), application sharing, platform Maintenance Tools, secured connections and authentication, knowledge database technologies. IMINT Online Program operates owing to: specialized experts in fields relating to IMINT. These experts carry out the tasks of consultants, coaches, occasional speakers, and course content designers

  8. Joint Intelligence Operations Center (JIOC) Baseline Business Process Model & Capabilities Evaluation Methodology (United States)


    Targeting Review Board OPLAN Operations Plan OPORD Operations Order OPSIT Operational Situation OSINT Open Source Intelligence OV...Analysis Evaluate FLTREPs MISREPs Unit Assign Assets Feedback Asset Shortfalls Multi-Int Collection Political & Embasy Law Enforcement HUMINT OSINT ...Embassy Information OSINT Manage Theater HUMINT Law Enforcement Collection Sort Requests Platform Information Agency Information M-I Collect

  9. Fighting Insurgents--No Shortcuts to Success

    National Research Council Canada - National Science Library

    Corum, James


    In a military with an overwhelmingly conventional war mindset with senior officers used to getting exact data verified by high tech scientific means, the very inexact intelligence provided by HUMINT...

  10. Information Foraging Theory: A Framework for Intelligence Analysis (United States)


    oceanographic information, human intelligence (HUMINT), open-source intelligence ( OSINT ), and information provided by other governmental departments [1][5...Human Intelligence IFT Information Foraging Theory LSA Latent Semantic Similarity MVT Marginal Value Theorem OFT Optimal Foraging Theory OSINT

  11. Lambda Vision (United States)

    Czajkowski, Michael


    There is an explosion in the quantity and quality of IMINT data being captured in Intelligence Surveillance and Reconnaissance (ISR) today. While automated exploitation techniques involving computer vision are arriving, only a few architectures can manage both the storage and bandwidth of large volumes of IMINT data and also present results to analysts quickly. Lockheed Martin Advanced Technology Laboratories (ATL) has been actively researching in the area of applying Big Data cloud computing techniques to computer vision applications. This paper presents the results of this work in adopting a Lambda Architecture to process and disseminate IMINT data using computer vision algorithms. The approach embodies an end-to-end solution by processing IMINT data from sensors to serving information products quickly to analysts, independent of the size of the data. The solution lies in dividing up the architecture into a speed layer for low-latent processing and a batch layer for higher quality answers at the expense of time, but in a robust and fault-tolerant way. This approach was evaluated using a large corpus of IMINT data collected by a C-130 Shadow Harvest sensor over Afghanistan from 2010 through 2012. The evaluation data corpus included full motion video from both narrow and wide area field-of-views. The evaluation was done on a scaled-out cloud infrastructure that is similar in composition to those found in the Intelligence Community. The paper shows experimental results to prove the scalability of the architecture and precision of its results using a computer vision algorithm designed to identify man-made objects in sparse data terrain.

  12. Policing Toward a De-Clawed Jihad: Antiterrorism Intelligence Techniques for Law Enforcement (United States)


    intelligence that has been analyzed and interpreted halal (Arabic) n., Islamic dietary strictures; adj., of or relating to halal HUMINT n., markets; production and distribution of counterfeit goods or bootlegged music and videos; resale of expired food products at small grocery 113 Halal constitutes Islamic dietary strictures, similar to Kosher in Judaism. 44 an ethnic

  13. Intelligence Collection Targeting and Interdiction of Dark Networks (United States)


    examples of terrorist technological communications countered by a baseline of NTM collection with OSINT and HUMINT only serving as enablers or...he visits while traveling as an ostensible tourist ( OSINT ) would be useful.54 In summary, Sims’s observation not only enforce the strategic

  14. Combating Terrorism: North American Aerospace Defense Command Versus Asymmetric Threats (United States)


    surveillance, and reconnaisance (ISR) platforms, human intelligence (HUMINT) from espionage, and open-source intelligence ( OSINT ), which is putting... OSINT : open-source intelligence OTH-B: over-the-horizon-backscatter PAVE PAWS: Perimeter Acquisition Vehicle Entry Phased Array Warning System

  15. Air Commando Intel: Optimizing Specialization Training for Air Force Special Operations Command Intelligence Officers (United States)


    15 2. Managing Careers by Core Competencies ......................................15 D. GLASS CEILINGS ...Transforming the Force: Past, Present & Future,” Slide presentation, Washington, D.C., October 28, 2002, 5. 38 Ibid. 17 D. GLASS CEILINGS Getting AF...Agency Support to PR MSN Mission Planning SOF Mission Planning Exercise/Organization, Case Studies (Somalia/ Lebanon ), HUMINT case study SYS Systems

  16. Virtual Collaboration for a Distributed Enterprise (United States)


    aircraft SIGINT signals intelligence UAV unmanned aerial vehicle VoIP voice over Internet protocol 1 1. The Need for Effective Virtual...Z., and Robert H. Anderson, Toward an Ethics and Etiquette for Electronic Mail, Santa Monica, Calif.: RAND Corporation, R-3283-NSF/RC, 1985. As of

  17. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter


    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  18. Swarming and the Future of Warfare (United States)


    and Plans DIVARTY Division Artillery DoD Department of Defense EO Electro-Optical EXFOR Experimental Force FLIR Forward-Looking Infrared FOFA Follow-on...HUMINT Human Intelligence xiii IED Improvised Explosive Device IFV Infantry Fighting Vehicle 10 Information Operations IR Infrared ISR Intelligence...and the rifles of WW2 (9 out of 1,000). 37 No longer could artillery unlimber within 300 yards and shoot at infantry with relative impunity since

  19. The Intelligence Problem of Policymakers in Counterinsurgency: Asking And Answering the Right Questions (United States)


    explosive device ISR intelligence, surveillance and reconnaissance J2 joint staff intelligence section NATO North Atlantic Treaty Organization OSINT open...commonly referring to the technical means of collection to the exclusion of HUMINT, open source intelligence ( OSINT ), and other information using to gain popular support or to delegitimize the supported government. The 10th Mountain Division determined OSINT was an important component

  20. Assault on the USS LIBERTY: Deliberate Action or Tragic Accident? (United States)


    fear of an Egyptian attack from the sea compounded with the explosion at al-‘Arish, set the events into motion.74 The torpedo boats miscalculated...differences with the USS Liberty. The Liberty is 200 feet longer, covered with antennas, and has a state-of-the-art parabolic satellite dish.85 Perhaps...collection position.] 14 Ibid, 13. 15 Ibid, 14. 16 William D. Gerhard and Henry W. Millington, Attack on a Sigint Collector , the U.S.S Liberty

  1. The Sensor Irony: How Reliance on Sensor Technology is Limiting Our View of the Battlefield (United States)


    operations; quite the contrary. “History is littered with prophesies of technical and scientific inadequacy, such as Lord Kelvin’s famous retort , ‘Heavier...U.S. Air Force, Factsheets, RQ-4 Global Hawk. designed with the potential to carry a Signals Intelligence (SIGINT) package in lieu of its SAR...discussed in the Predator sensor package , and adds an additional image-intensifying TV camera.4 The Reapers’ GTMI/SAR capability is best represented

  2. Army Communicator. Volume 32, Number 2, Spring 2007 (United States)


    Strategic Command, Defense Information Systems Agency, or at Combatant Command or Army Major Com- mand staffs. Although there is no yellow brick road of...given, set in stone by the temperature of the low noise amplifier, which is generally ambient air temperature, about 70 degrees Fahrenheit. So innovation research SIGINT – signals intelligence SME – superconducting microelec- tronics SPAWAR – Space and Naval War- fare Systems Command

  3. Standing on the Shoulders of Giants: Where Do We Go from Here to Bring the Fire Service into the Domestic Intelligence Community? (United States)


    Intelligence : Understanding the Hidden Side of Government. Vol. 1. Westport, CT: Praeger Security International, 2007. 4 Ibid., 4. 8 • OSINT – Open ... source intelligence from open literature such as newspapers • SIGINT – Signals intelligence from capturing communications from one person to... intelligence community. The fire service in gaining access to information and adding untapped sources of information/ intelligence can add value to the

  4. Multi-source remote sensing data management system

    International Nuclear Information System (INIS)

    Qin Kai; Zhao Yingjun; Lu Donghua; Zhang Donghui; Wu Wenhuan


    In this thesis, the author explored multi-source management problems of remote sensing data. The main idea is to use the mosaic dataset model, and the ways of an integreted display of image and its interpretation. Based on ArcGIS and IMINT feature knowledge platform, the author used the C# and other programming tools for development work, so as to design and implement multi-source remote sensing data management system function module which is able to simply, conveniently and efficiently manage multi-source remote sensing data. (authors)

  5. The Cyber Intelligence Challenge of Asyngnotic Networks

    Directory of Open Access Journals (Sweden)

    Edward M. Roche


    Full Text Available The intelligence community is facing a new type of organization, one enabled by the world’s information and communications infrastructure. These asyngnotic networks operate without leadership and are self-organizing in nature. They pose a threat to national security because they are difficult to detect in time for intelligence to provide adequate warning. Social network analysis and link analysis are important tools but can be supplemented by application of neuroscience principles to understand the forces that drive asyngnotic self-organization and triggering of terrorist events. Applying Living Systems Theory (LST to a terrorist attack provides a useful framework to identify hidden asyngnotic networks. There is some antecedent work in propaganda analysis that may help uncover hidden asyngnotic networks, but computerized SIGINT methods face a number of challenges.

  6. The Objectives of Competitive Intelligence as a Part of Corporative Development Strategy

    Directory of Open Access Journals (Sweden)

    František Bartes


    Full Text Available This paper deals with the issue of the management cycle of Competitive Intelligence. The author describes the process of Competitive Intelligence in Czech corporate management. He concludes that in most cases, the Competitive Intelligence operations are directed by the top management, and the attention of Competitive Intelligence is being paid to Key Intelligence Topics (KIT. The Competitive Intelligence is then focused on the output of strategic analyses, complemented in some cases with a summary (synthesis of acquired intelligence plus some signal intelligence (SIGINT. The results of the Competitive Intelligence produced in such a way are actually the outputs mostly applicable in operational management and mostly unsuitable for strategic management. However, top managers abroad almost invariably need the data relevant to the future situation since their decisions are of strategic nature. The following section of the paper is devoted to the conceptual solution of Competitive Intelligence, i.e. the Competitive Intelligence objectives linked with the development strategy of the corporation. Here the author arrives at three basic development strategies: a. the corporation desires status quo, i.e. to keep its market position as it is, b. the corporation is out to expand, and c. the corporation intends not only to keep its existing and dominant market position but strives for its long-term dominance to last.

  7. Enhanced tactical radar correlator (ETRAC): true interoperability of the 1990s (United States)

    Guillen, Frank J.


    The enhanced tactical radar correlator (ETRAC) system is under development at Westinghouse Electric Corporation for the Army Space Program Office (ASPO). ETRAC is a real-time synthetic aperture radar (SAR) processing system that provides tactical IMINT to the corps commander. It features an open architecture comprised of ruggedized commercial-off-the-shelf (COTS), UNIX based workstations and processors. The architecture features the DoD common SAR processor (CSP), a multisensor computing platform to accommodate a variety of current and future imaging needs. ETRAC's principal functions include: (1) Mission planning and control -- ETRAC provides mission planning and control for the U-2R and ASARS-2 sensor, including capability for auto replanning, retasking, and immediate spot. (2) Image formation -- the image formation processor (IFP) provides the CPU intensive processing capability to produce real-time imagery for all ASARS imaging modes of operation. (3) Image exploitation -- two exploitation workstations are provided for first-phase image exploitation, manipulation, and annotation. Products include INTEL reports, annotated NITF SID imagery, high resolution hard copy prints and targeting data. ETRAC is transportable via two C-130 aircraft, with autonomous drive on/off capability for high mobility. Other autonomous capabilities include rapid setup/tear down, extended stand-alone support, internal environmental control units (ECUs) and power generation. ETRAC's mission is to provide the Army field commander with accurate, reliable, and timely imagery intelligence derived from collections made by the ASARS-2 sensor, located on-board the U-2R aircraft. To accomplish this mission, ETRAC receives video phase history (VPH) directly from the U-2R aircraft and converts it in real time into soft copy imagery for immediate exploitation and dissemination to the tactical users.

  8. Police training in interviewing and interrogation methods: A comparison of techniques used with adult and juvenile suspects. (United States)

    Cleary, Hayley M D; Warner, Todd C


    Despite empirical progress in documenting and classifying various interrogation techniques, very little is known about how police are trained in interrogation methods, how frequently they use various techniques, and whether they employ techniques differentially with adult versus juvenile suspects. This study reports the nature and extent of formal (e.g., Reid Technique, PEACE, HUMINT) and informal interrogation training as well as self-reported technique usage in a diverse national sample (N = 340) of experienced American police officers. Officers were trained in a variety of different techniques ranging from comparatively benign pre-interrogation strategies (e.g., building rapport, observing body language or speech patterns) to more psychologically coercive techniques (e.g., blaming the victim, discouraging denials). Over half the sample reported being trained to use psychologically coercive techniques with both adults and juveniles. The majority (91%) receive informal, "on the job" interrogation training. Technique usage patterns indicate a spectrum of psychological intensity where information-gathering approaches were used most frequently and high-pressure tactics less frequently. Reid-trained officers (56%) were significantly more likely than officers without Reid training to use pre-interrogation and manipulation techniques. Across all analyses and techniques, usage patterns were identical for adult and juvenile suspects, suggesting that police interrogate youth in the same manner as adults. Overall, results suggest that training in specific interrogation methods is strongly associated with usage. Findings underscore the need for more law enforcement interrogation training in general, especially with juvenile suspects, and highlight the value of training as an avenue for reducing interrogation-induced miscarriages of justice. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  9. Computational and Mathematical Modeling of Coupled Superconducting Quantum Interference Devices (United States)

    Berggren, Susan Anne Elizabeth

    This research focuses on conducting an extensive computational investigation and mathematical analysis into the average voltage response of arrays of Superconducting Quantum Interference Devices (SQUIDs). These arrays will serve as the basis for the development of a sensitive, low noise, significantly lower Size, Weight and Power (SWaP) antenna integrated with Low-Noise Amplifier (LNA) using the SQUID technology. The goal for this antenna is to be capable of meeting all requirements for Guided Missile Destroyers (DDG) 1000 class ships for Information Operations/Signals Intelligence (IO/SIGINT) applications in Very High Frequency/Ultra High Frequency (V/UHF) bands. The device will increase the listening capability of receivers by moving technology into a new regime of energy detection allowing wider band, smaller size, more sensitive, stealthier systems. The smaller size and greater sensitivity will allow for ships to be “de-cluttered” of their current large dishes and devices, replacing everything with fewer and smaller SQUID antenna devices. The fewer devices present on the deck of a ship, the more invisible the ship will be to enemy forces. We invent new arrays of SQUIDs, optimized for signal detection with very high dynamic range and excellent spur-free dynamic range, while maintaining extreme small size (and low radar cross section), wide bandwidth, and environmentally noise limited sensitivity, effectively shifting the bottle neck of receiver systems forever away from the antenna itself deeper into the receiver chain. To accomplish these goals we develop and validate mathematical models for different designs of SQUID arrays and use them to invent a new device and systems design. This design is capable of significantly exceeding, per size weight and power, state-of-the-art receiver system measures of performance, such as bandwidth, sensitivity, dynamic range, and spurious-free dynamic range.