What should OPSEC planning focus on?

Looking for Expert Opinion?

Show

Let us have a look at your work and suggest how to improve it!

Get a Consultant

Operations Security (OPSEC) defines Critical Information as:

Classified information critical to the development of operational plans.

Information needed by NATO forces in order to coordinate coalition and multinational operations.

Classified information critical to the development of all military activities

All answers are correct.

Specific facts about friendly intentions, capabilities, and activities needed by adversaries to plan and act effectively against friendly mission accomplishment.

Specific facts about friendly intentions, capabilities, and activities needed by adversaries to plan and act effectively against friendly mission accomplishment.

OPSEC planning should focus on:

Routine daily activities to include all unclassified information.

Routine daily activities that only include classified information.

None of the answers apply.

Identifying adversary order of battle information.

Identifying and protecting critical information.

Identifying and protecting critical information.

OPSEC is concerned with:

The daily administrative activities associated with military operations.

Identifying and controlling classified information.

Identifying and controlling classified and unclassified information.

Controlling the operations of daily activities.

Identifying, controlling, and protecting unclassified information that is associated with specific military operations and activities.

Identifying, controlling, and protecting unclassified information that is associated with specific military operations and activities.

The Joint COMSEC Monitoring Activity provides OPSEC assistance by:

Monitoring unclassified government telephones and monitoring NIPR email traffic.

Monitoring communications only for specific named operations.

Monitoring unclassified government telephones.

Monitoring NIPR email traffic.

Monitoring of COMMAND SECURITY (COMSEC) processes and procedures.

Monitoring of COMMAND SECURITY (COMSEC) processes and procedures.

The identification of critical information is a key part of the OPSEC process because:

It focuses the remainder of the OPSEC process on protecting vital information rather than attempting to protect all unclassified information.

It is the fifth and final step of the OPSEC process.

None of the answers are correct.

It focuses the OPSEC process on protecting all unclassified information.

It is required by the JTF commander to formulate operational COAs in the planning process.

It focuses the remainder of the OPSEC process on protecting vital information rather than attempting to protect all unclassified information.

An OPSEC indicator is defined as:

The key piece of OPSEC information used to brief individuals prior to deployments in support of named operations.

Friendly detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information.

Friendly detectable actions and open-source information that can be pieced together by an adversary to derive critical information as well as an OPSEC measurement used to assess the effectiveness of the program via measures of performance.

An OPSEC situation that indicates adversary activity.

An OPSEC measurement used to assess the effectiveness of the program via measures of performance and measures of effectiveness.

Friendly detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information.

  • Measurement and Signature Intelligence (MASINT).

    HUMINT uses human beings as both the source of information and primary collection instrument. When the majority of Americans think of espionage, they think of the human collector, or spy. SIGINT involves intelligence information derived from signals intercept. Included under SIGINT are communications intelligence (COMINT), electronic intelligence (ELINT), and foreign instrumentation signals intelligence (FISINT). IMINT concerns intelligence derived from the exploitation of information collected by visual photography, infrared sensors, lasers, electro-optics, and radar sensors such as synthetic aperture radar. To permit analysis, images derived from these sensors are reproduced optically or electronically on film, on electronic display devices, or using other media. MAS1NT concerns intelligence derived through technical collection systems for the purpose of identifying distinctive features associated with the source, emitter, or sender that will permit the subsequent identification of these collection targets. Common sub-disciplines of MASINT are acoustical intelligence (ACOUSTINT), laser intelligence (LASINT), and radiation intelligence (RADINT).[3]

    Open source material and overt observation of sensitive activities and operations are major sources of information for groups targeting organizations in the United States. With the ongoing explosion of information resources, the challenge to OPSEC program managers posed by open source collection is likely to grow exponentially in coming years. OPSEC program managers must be keenly aware of the threat posed by open source collection and ensure this threat is recognized in the organization's OPSEC program.

    The Role of OPSEC

    Operations security procedures and requirements were formalized in 1988 under the provisions of National Security Decision Directive 298, The National Operations Security Program.[4] OPSEC was not intended to be a replacement for security programs created to protect classified information such as physical security, information security, and personnel security. OPSEC was developed to promote operational effectiveness by denying adversaries publicly available indicators of sensitive or classified activities, capabilities, or intentions.[5] The goal of OPSEC is to control information and observable actions about an organization's capabilities, limitations, and intentions to prevent or control exploitation of available information by an adversary. The OPSEC process involves five steps, which will be discussed in greater depth later in this section. These steps are:

  • Identification of Critical Information
  • Analysis of Threats
  • Analysis of Vulnerabilities
  • Assessment of Risks
  • Application of Appropriate Countermeasures.

    The OPSEC process begins with an examination of the entire organization or activity to determine what exploitable but unclassified evidence of classified or sensitive activities may be acquired by an adversary through known collection capabilities. Evidence indicating sensitive activities can often be derived from publicly available information and pieced together to derive critical information. Indicators of sensitive activities may result from routine administrative, logistics, or operational activities that are known to precede the execution of a plan or activity. Once identified, indicators are analyzed in terms of the known collection capabilities of an adversary. Program managers then use threat and vulnerability analysis to develop risk assessments to assist in selecting and adopting countermeasures.

    The OPSEC Process

    Operations security considerations must be integral to the process of planning for classified and sensitive operations or activities. Early implementation of OPSEC planning promotes the consideration of elements to maintain essential secrecy throughout the life cycle of the program. OPSEC planning requires a clear understanding of the activity's mission and organizational plans. The OPSEC program must be integrated into organizational activities by personnel familiar with the operational aspects of the activity in coordination with supporting counterintelligence and security activities. OPSEC plans should identify countermeasures that are required to complement physical, information, personnel, signals computer, communications, and electronics security measures to ensure a total integration of security countermeasures. OPSEC countermeasures may include, but are not limited to: modification of operational and administrative routines; the use of cover, concealment, deception; and other measures that degrade the adversary's ability to exploit indicators of critical information.

    Although the OPSEC Process has been described as having five definitive steps, these steps were never intended to be strictly adhered to in sequential order. A recognized strength of the OPSEC process is that its elements are fluid, enabling the OPSEC planner to adapt the process to the particular needs of the organization. The strength of the OPSEC process was recognized by the Joint Security Commission in its final report when the OPSEC process was made the basis for risk management activities conducted by the U.S. Government.[6] The key benefit of the OPSEC process is that it provides a means for developing cost-effective security countermeasures tailored to meet the identified threat. As stated above, the five steps of the OPSEC process are:

    Identification of Critical Information.

    Critical information is factual data about an organization's intentions, capabilities, and activities that the adversary needs to plan and act effectively to degrade operational effectiveness or place the potential for organizational success at risk. The OPSEC process identifies critical information and determines when that information may cease to be critical in the life cycle of an operation, program, or activity.

    Analysis of Threats.

    Threat analysis consists of determining the adversary's ability to collect, process, analyze, and use information. The objective of threat analysis is to know as much as possible about each adversary and their ability to target the organization. It is especially important to tailor the adversary threat to the actual activity and, to the extent possible, determine what the adversary's capabilities are with regard to the specific operations of the activity or program.

    Analysis of Vulnerabilities.

    Vulnerability analysis requires that the OPSEC analyst adopt an adversarial view of the activity requiring protection. The analyst attempts to identify weaknesses or susceptibilities that can exploited by the adversary's collection capabilities. The vulnerability analysis process must identify the range of activities that can be observed by the adversary, the type of information that can be collected, and the specific organizational weaknesses that the adversary can exploit. Based on this knowledge, the OPSEC analyst determines what critical information the adversary can derive based on the known threat and assessed vulnerabilities.

    Assessment of Risks.

    Risk assessment is the heart of the OPSEC process. In a risk assessment, threats and vulnerabilities are compared to determine the potential risk posed by adversary intelligence collection activities targeting an activity, program, or organization. When the level of vulnerability is assessed to be high and the adversary threat is evident, then adversary exploitation is expected, and risks are assessed to be high. When the vulnerability is slight, and the adversary's collection ability is rated to be moderate or low, the risk may be determined to be low, and no protective measures may be required. Based on the assessed level of risk, cost/benefit measures can be used to compare potential countermeasures in terms of their effectiveness and cost.

    Application of Appropriate Countermeasures.

    In the final step, countermeasures are developed to protect the activity. Ideally, the chosen countermeasures eliminate the adversary threat, the vulnerabilities that can be exploited by the adversary, or the utility of the information. In assessing countermeasures, the impact of the loss of critical information on organizational effectiveness must be balanced against the cost of implementing corrective measures. Possible countermeasures should include alternatives that may vary in terms of feasibility, cost, and effectiveness. Based on the probability of collection, the cost effectiveness of various alternatives and the criticality of the activity countermeasures are selected by the program manager. In some cases, there may be no effective means to protect information because of cost or other factors that make countermeasure implementation impossible. In such cases, the manager must decide to accept the degradation of effectiveness or cancel the activity.[7]

    As we have seen, threat analysis is a key part of the OPSEC process. The threat assessment is the basis for both the vulnerability analysis and the risk assessment. Essentially the degree of vulnerability and risk is determined by the extent of the assessed threat. As a result, it is critical that threat assessments accurately reflect the totality of the intelligence collection effort targeting the organization. This document provides an overview of the potential range of threats that may affect an activity or organization. Specific threat data should be obtained from supporting counterintelligence activities in preparing OPSEC plans.

    Structure of this Handbook

    The remainder of this handbook examines the threat posed by intelligence collection activities to friendly organizations and activities. Section 2 examines intelligence collection activities and the various intelligence collection disciplines used to target various activities. Section 3 focuses on adversary foreign intelligence services targeting the United States to collect sensitive economic, proprietary, political, and military information. It examines the activities of these organizations and the types of information that these nations are seeking. Section 4 examines collection activities by nations supporting terrorism and collection by terrorist groups targeting U.S. activities in the Continental United States and abroad. Section 5 looks at economic intelligence collection against the United States being conducted by nation states and by corporations. Section 6 examines the growing threat posed by open source collection made possible by the increasing availability of information and the expansion of information systems that permit the comparison and analysis of massive amounts of seemingly disparate information. The final section examines the effect of the threat on OPSEC programs and presents threat analysis requirements for OPSEC program managers.

    Sources

    1 - U.S. House of Representatives, The Threat of Foreign Economic Espionage to U.S. Corporations, Hearings before the Subcommittee on Economic and Commercial Law, Committee on the Judiciary, April 29, May 7, 1992, Washington, DC: USGPO.

    2 - Bruce w. Nelan, "A New World for Spies," Time, July 5, 1993, pp 28-31; Noreen Alster, "The Valley of the Spies," Forbes, October 26, 1992, pp. 200-206; and Frank Greve, "French Techno-Spies Bugging U.S. Industry," San Jose Mercury News, October 21, 1992, p. F1.

    3 - Interagency OPSEC Support Staff, Compendium of OPSEC Terms and Definitions, April 1991, Greenbelt, MD: IOSS.

    4 - National Security Decision Directive 298; The National Operations Security Program, January 22, 1988, Washington, DC: The White House.

    5 - Interagency OPSEC Support Staff, The National OPSEC Program, Greenbelt, MD: IOSS, April 1992.

    6 - Joint Security Commission, Redefining Security: A Report to the Secretary of Defense and the Director of Central Intelligence, February 28, 1994.

    7 - Interagency OPSEC Support Staff, The National OPSEC Program, Greenbelt, MD: IOSS, April 1992.


  • Page 2

    What should OPSEC planning focus on?

    [Back]
    What should OPSEC planning focus on?

    [Index]
    What should OPSEC planning focus on?

    [Next]

    Defining Intelligence

    Intelligence is the product resulting from the collection, collation, evaluation, analysis, integration, and interpretation of collected information.[1] It is a specialized information product that provides the United States or an adversary with information required to further its national interests. One of the most important functions of intelligence is the reduction of the ambiguity inherent in the observation of external activities. In the most obvious case, adversary intelligence organizations may seek information concerning military capabilities or other matters that directly threaten the national security of the United States. In other cases, adversary nations, or other groups, may seek information about U.S. diplomatic negotiating positions, economic programs, or proprietary information from U.S. corporations.

    In each of these cases, the information sought may provide the adversary with an edge and might allow him to implement a well-developed strategy to reach his goals. In most cases, the development of an intelligence product involves collecting information from a number of different sources. In some cases, information may be disseminated immediately upon collection based upon operational necessity and potential impact on current operations. This type of raw intelligence is usually based on fragmentary information about fast-breaking events and may contain substantial inaccuracies or uncertainties that must be resolved through subsequent report and analysis. Finished intelligence products contain information that is compared, analyzed, and weighted to allow the development of conclusions. Finished intelligence is produced through analytical review in the intelligence process. The intelligence process confirms a fact or set of facts through a multiplicity of sources to reduce the chance of erroneous conclusions and susceptibility to deception.

    Intelligence is divided into strategic and operational intelligence. Strategic intelligence provides policy makers with the information needed to make national policy or decisions of long-lasting importance. Strategic intelligence collection often requires integrating information concerning politics, military affairs, economics, societal interactions, and technological developments. It typically evolves over a long period of time and results in the development of intelligence studies and estimates. Operational intelligence is concerned with current or near-term events. It is used to determine the current and projected capability of a program or operation on an ongoing basis and does not result in long-term projections. Most intelligence activities support the development of operational intelligence. [2]

    The Intelligence Cycle

    The intelligence cycle is the process through which intelligence is obtained, produced, and made available to users. In depicting this cycle, the United States Intelligence Community uses a five-step process. Other nations may describe this cycle differently; however, the process is largely the same. The steps in the intelligence cycle are depicted in the following illustration:

    What should OPSEC planning focus on?

    Planning and Direction. The first step in the cycle, planning and direction, involves the management of the entire intelligence effort, from the identification of a need for data to the final delivery of the intelligence product to the consumer. The process consists of identifying, prioritizing, and validating intelligence requirements, translating requirements into observables, preparing collection plans, issuing requests for information collection, production, and dissemination, and continuously monitoring the availability of collected data. In this step specific collection capabilities are tasked, based on the type of information required, the susceptibility of the targeted activity to various types of collection activity, and the availability of collection assets.

    Collection. The second step, collection, includes both acquiring information and provisioning that information to processing and production elements. The collection process encompasses the management of various activities, including developing collection guidelines that ensure optimal use of available intelligence resources. Intelligence collection requirements are developed to meet the needs of potential consumers. Based upon identified intelligence, requirements collection activities are given specific taskings to collect information. These taskings are generally redundant and may use a number of different intelligence disciplines for collection activities. Tasking redundancy compensates for the potential loss or failure of a collection asset. It ensures that the failure of a collection asset is compensated for by duplicate or different assets capable of answering the collection need. The use of different types of collection systems contributes to redundancy. It also allows the collection of different types of information that can be used to confirm or disprove potential assessments. Collection operations depend on secure, rapid, redundant, and reliable communications to allow for data exchange and to provide opportunities for cross-cueing of assets and tip-off exchanges between assets. Once collected, information is correlated and forwarded for processing and production.

    Processing. The third step, processing, is the conversion of collected information into a form suitable for the production of intelligence. In this process, incoming information is converted into formats that can be readily used by intelligence analysts in producing intelligence. Processing may include such activities as translation and reduction of intercepted messages into written format to permit detailed analysis and comparison with other information. Other types of processing include video production, photographic processing, and correlation of information collected by technical intelligence platforms.

    Production. The fourth step, production, is the process of analyzing, evaluating, interpreting, and integrating raw data and information into finished intelligence products for known or anticipated purposes and applications. The product may be developed from a single source or from all-source collection and databases. To be effective, intelligence production must focus on the consumer's needs. It should be objective, timely, and most importantly accurate. As part of the production process, the analyst must eliminate information that is redundant, erroneous, or inapplicable to the intelligence requirement. As a result of the analytical effort, the analyst may determine that additional collection operations are required to fill in gaps left by previous collection or existing intelligence databases. The final intelligence product must provide the consumer with an understanding of the subject area, and draw analytical conclusions supported by available data.

    Dissemination. The final step of the intelligence cycle is dissemination. Dissemination is the conveyance of intelligence to the consumer in a usable form. Intelligence can be provided to the consumer in a wide range of formats including verbal reports, written reports, imagery products, and intelligence databases. Dissemination can be accomplished through physical exchanges of data and through interconnected data and communications networks.[3]

    The OPSEC program manager should be aware of the intelligence cycle for three reasons. First, this awareness allows the manager to play a role in the production of intelligence required to support his OPSEC program. The OPSEC program manager must be aware of the range of threats that confront his program, or he will not be able to implement countermeasures to deny the adversary access to data that may provide critical information. Knowledge of the intelligence cycle and the various Intelligence Community organizations allows the OPSEC program manager to determine how to access intelligence needed for conduct of the OPSEC process.

    Second, knowledge of the intelligence cycle allows the OPSEC program manager to develop protective measures to thwart adversary collection activities. Knowledge of adversary intelligence planning derived through U.S. intelligence collection allows the OPSEC program manager to determine if his facility, operation, or program is targeted, or is likely to be targeted, by a particular adversary. Knowledge of an adversary's collection methods and patterns allows the program manager to develop effective countermeasures that hide or distort indicators.

    Finally, a knowledge of the adversary's analytical biases can be used to develop deception programs that deceive the adversary by confirming erroneous perceptions. The following section of this handbook examines the various intelligence collection disciplines and considers their use by adversaries against the United States.

    Intelligence Collection Disciplines

    Several intelligence disciplines are used by adversaries to acquire information concerning the United States. These disciplines include human intelligence HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measurement and signatures intelligence (MASINT), and open source intelligence (OSINT). Each of these disciplines is used by adversaries against the United States to some degree. Most nations, and many subnational and private organizations, have HUMINT capabilities that they use to collect data on their adversaries and competitors.

    Open source intelligence is successful in targeting the United States because of the openness of American society. Technical and professional journals are often lucrative sources for information concerning government and commercial activities in the United States. The growing number of on-line databases has increased the capacity of U.S. adversaries and competitors to develop tailored data products on U.S. government and industry activities by permitting them to review large quantities of information in very short periods of time. Search parameters used for these databases can be structured to extract only pertinent information for analysis.

    Open source collection becomes more of a threat as more information becomes electronically accessible. OPSEC program managers must be aware of the potential for open source collection against their activities and must ensure that protective countermeasures are developed to prevent inadvertent compromise of program activities through publication of data in publicly available media.

    Intelligence collection organizations may also use IMINT, SIGINT, and MASINT to gather data. These collection capabilities, however, are often limited by the technological capabilities of the intelligence organization. Historically, less technologically capable nations have been unable to gain access to information; however, this situation is changing. SIGINT technologies are proliferating throughout the world and are being sold by a wide variety of suppliers to nations that are known adversaries of the United States. Imagery products are becoming more readily available to non-traditional adversaries as commercial imagery products that approach the quality of intelligence collection systems become available for sale. MASINT, however, is still a relatively arcane collection discipline and only a limited number of nations have access to MASINT collection capabilities. The following sections discuss each of the collection disciplines and the type of information collected.

    HUMINT

    Human intelligence is derived from human sources.[4] To the public, HUMINT remains synonymous with espionage and clandestine activities, yet, in reality, most HUMINT collection is performed by overt collectors such as diplomats and military attaches. HUMINT is the oldest method for collecting information about a foreign power. Until the technical revolution of the mid to late twentieth century, HUMINT the primary source of intelligence for all governments. For most nations in the world, it remains the mainstay of their intelligence collection activities. HUMINT includes overt, sensitive, and clandestine activities and the individuals who exploit, control, supervise, or support these sources.

    Overt activities are performed openly. Overt HUMINT collectors can include military attaches, diplomatic personnel, members of official delegations, and debriefers at refugee centers. Overt HUMINT activities may include: exploiting unclassified publications, conference materials, and Congressional hearings; operating interrogation centers for refugees and prisoners of war; and debriefing legal travelers who traveled to countries of interest to a nation's intelligence service. Sensitive HUMINT activities may depend upon the same methods as overt activities, however, the sponsor of the activity must be protected from disclosure. Disclosure of the sponsor's identity may result in political embarrassment, compromise of other intelligence operations, or security threats to the sponsoring nation.[5]

    Clandestine HUMINT sources include agents who have been recruited or have volunteered to provided information to a foreign nation, and foreign nationals who successfully infiltrate an organization with a cover story. The latter cases are fairly rare, and generally come to the United States under the guise of being political refugees.[6] Once in the United States, they move into positions that allow them to gather political, technical, or economic information for their governments.

    According to one estimate, over 100 countries currently conduct intelligence operations against the United States.[7] Adversary intelligence organizations place a high priority on the acquisition of scientific and technical information and target the United States because of its preeminence in many high-technology areas. The United States Government, American corporations, and U.S. universities have been targeted by intelligence organizations seeking scientific and technical intelligence. The United States hosts more science and technology (S&T) officials, defense attaches, and identified intelligence officers than any other industrialized nation in the world.

    Intrusive on-site inspection activities required under some arms control agreements provide a significant opportunity for HUMINT collection at facilities of great importance to the national security of the United States. On-site inspection provisions are specified in the Treaty on Intermediate Range Nuclear Forces (INF), the Strategic Arms Reduction Treaty (START), the Bilateral Agreement between the United States and Russia on Chemical Weapons, and in the Treaty on Conventional Forces in Europe (CFE). In addition, the Peaceful Nuclear Explosions Treaty (PNET), the Threshold Test Ban Treaty (TTBT), and the Open Skies Treaty (OS) provide the opportunity to gather information from sensitive installations, even though no intrusive on-site inspections are permitted. These treaties provide for the use of technical collection capabilities to verify national declarations. The operation of these collection systems requires a significant number of support personnel, and some of these personnel are likely to be intelligence collectors. Intelligence collectors in onsite inspections will be accredited inspectors who are specially trained to collect specific types of data and enjoy diplomatic immunity. It is likely that these personnel will try to obtain intelligence through observation of facilities, elicitation of information from escorts and facility personnel, and collection of available documentation.

    Even with the explosion of technical capabilities, HUMINT can still provide information that even the most proficient technical collectors cannot, such as access to internal memoranda and to compartmented information. Most importantly, human collectors can provide key insights into the intentions of an adversary, whereas technical collection systems are often limited to determining capabilities.[8] HUMINT can be used to reveal adversary plans and intentions, or uncover scientific and weapons developments before they are used or are detected by technical collection systems. HUMiNT can also provide documentary evidence such as blueprints of facilities, copies of adversary plans, or copies of diplomatic or policy documents. Finally, HUMINT is extremely cost effective compared with technical collection systems and does not require a significant technological production base for support.

    SIGINT

    Signals intelligence is derived from signal intercepts comprising, either individually or in combination, all communications intelligence (COMINT), electronic intelligence (ELlNT), and foreign instrumentation signals intelligence (FISINT), however transmitted.[9] COMINT, one of the primary SIG[NT disciplines, includes information derived from intercepted communications transmissions. COMINT targets voice and teleprinter traffic, video, Morse code traffic, or even facsimile messages. Assuming access is possible, COMINT can be collected from the air waves, cable, fiber optics, or any other transmission medium. ELINT includes the interception and analysis of noncommunications transmissions, such as radar. ELlNT is used to identify the location of an emitter, determine its characteristics, and infer the characteristics of supported systems. FISINT consists of intercepts of telemetry from an opponent's weapons systems as they are being tested. Telemetry units provide designers with information on a prototype's guidance system operation, fuel usage, staging, and other parameters vital for understanding operational characteristics. These data enable the designer to evaluate the performance of the prototype. However, if intercepted, they also provide an adversary with the ability to estimate the capability of the prototype.

    Signals intelligence collection can be performed from a variety of platforms. Examples include overt ground collection sites, such as the Russian facility at Lourdes, Cuba; ships and aircraft; and covert locations inside the United States. SIGINT facilities can monitor transmissions from communications satellites, as well as terrestrial facilities. This is particularly important because many international transmissions originating in the United States depend on communications satellites for passage overseas. Communications satellites supporting the transmission of U.S. Government, private sector, and public communications include the International Maritime Satellite system ([NMARSAT), the International Telecommunications Satellite system (INTELSAT),and the European Satellite system (EUROSAT). International communications satellites are routinely monitored by foreign intelligence services, including the Russian and Chinese intelligence services. The majority of collection capabilities targeting the United States are either ground or sea based, and target line-of-site or satellite communication systems. Space-based collection systems can also collect COMINT, FISINT, and ELINT.[10]

    MASINT

    MASINT is scientific and technical intelligence information obtained by quantitative and qualitative analysis of data derived from specific technical sensors for the purpose of identifying any distinctive features associated with the source emitter or sender. This information is then used to facilitate the subsequent identification or measurement of the same type of equipment. The term measurement refers primarily to the data collected for the purpose of obtaining finite metric parameters. The term signature refers primarily to data indicating the distinctive features of phenomena, equipment, or objects as they are sensed by the collection instrument. The signature is used to recognize the phenomenon, equipment, or object when its distinctive features are detected.

    Examples of MASINT disciplines include radar intelligence (RAD[NT), infrared intelligence (IRINT), and nuclear intelligence (NUCINT). Because it works in different parts of the electromagnetic spectrum, MASINT detects information patterns not previously exploited by sensors. MASINT sensors collect information generally considered by the targeted nation to be peripheral in nature. As a result, these signatures are often not protected by any countermeasures.

    IMINT

    IMINT is a product of imagery analysis. Imagery includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media. Imagery can be derived from visual photography, radar sensors, infrared sensors, lasers, and electro-optics. IMINT includes the exploitation of data to detect, classify, and identify objects or organizations. It can be produced from either hard- or soft-copy (digital) imagery. Hard-copy imagery is synonymous with film, while soft-copy imagery is displayed on electronic terminals. Both types of imagery sources can be analyzed and interpreted for various purposes by different users.

    At one time, the imagery intelligence threat was largely restricted to the former Soviet Union and later to the Russian Federation. This is no longer true. The proliferation of space-based imagery systems permits a much greater use of imagery products by nations that previously did not have access to them. Currently, imagery can be purchased from a variety of sensors. These systems include the Landsat multispectral imagery (MSI) system operated by the United States, the French SPOT MSI and pan-chromatic imaging system, the European Space Agency's ERS-1 synthetic aperture radar imaging system, and the Japanese JERS-1 multisensor imager.[11] Additionally, the Russians are selling 2-meter or better imagery from their spacebased reconnaissance systems. The commercial imagery market is likely to continue to grow at an exponential rate, and additional collection systems are currently being developed. These will include imaging systems produced by U.S. companies that will be capable of producing 1-meter resolution electro-optical digitized imagery. One meter imagery is sufficient to conduct technical analysis of terrain, determine key facilities in an urban area, and conduct detailed analyses of industrial facilities. Other nations such as France, Germany, Japan, and Canada are producing advanced imagery platforms that could be used to target sensitive facilities. Existing imagery systems and developmental commercial systems will be discussed in greater detail in Section 5. An additional factor that must be considered is the growing availability of sophisticated imagery work stations, and analytical tools. These capabilities will allow adversaries to conduct in-depth analysis for targeting and technical intelligence gathering.[12]

    The 1992 Open Skies Treaty also poses an imagery collection threat. The treaty establishes a regime of unarmed aerial observation flights over the entire territory of its signatories. The treaty was negotiated between the members of NATO and the former Warsaw Pact as a means to promote openness and transparency of military forces and activities. Observation flights can be performed from aircraft provided by the observing nation, the observed nation, or a third participating party. Aircraft can be equipped with panoramic and framing cameras capable of a ground resolution of no better than 30 centimeters, video cameras with a ground resolution of no better than 30 centimeters, infrared line scanning devices with ground resolution of no better than 50 centimeters, and synthetic aperture radar systems with impulse response rate resolutions no better than 3 meters. Ground resolutions of 50 centimeters or less provide significant detailed information for an imagery analyst. Using the imagery derived from Open Skies flights analysts will be able to identify particular types of equipment by type and capability, and perform detailed analyses of rail, port, industrial, and military facilities.[13]

    Imagery provides significant benefits to an adversary collecting intelligence against the United States. First, properly mensurated imagery can provide geolocation accuracies for weapons systems targeting, or other intelligence collection platforms. Second, imagery allows activity to be detected, target characteristics studied in detail, and equipment and facilities enumerated. Third, large areas can be covered by imagery sensors for mapping of areas of key importances

    Imagery also has limitations. Except for synthetic aperture radar, imagery quality is normally degraded by darkness and adverse weather. This allows the targeted organization to use these periods of time to conduct activities that they wish to go unobserved. If an organization is aware that it is being targeted by imagery systems, they can use camouflage, concealment, and deception (CC&D) techniques to obscure their activities or provide a misleading image to the observing party. Effective use of CC&D may result in the adversary drawing erroneous conclusions about the observed organization's capabilities and activities. Finally, imagery intelligence collection usually requires a technologically oriented infrastructure. While this requirement may be lessened to some extent in the future, effective use of imagery will still require well educated, technically competent analysts --- a capability that may be beyond some U.S. adversaries.

    OSINT

    Open source intelligence involves the use of materials available to the public by intelligence agencies and other adversaries. Some analysts have estimated that the Soviet Union derived up to 90 percent of its intelligence from open source information. With the proliferation of electronic databases, it has become easier to collate large quantities of data, and structure information to meet the needs of the adversary collector. Open source information can often provide extremely valuable information concerning an organization's activities and capabilities. Frequently, open source material can provide information on organizational dynamics, technical processes, and research activities not available in any other form. When open source data is compiled, it is often possible to derive classified data or trade secrets. This is particularly true in the case of studies published in technical journals. A significant understanding of research and development efforts can often be derived by analyzing journal articles published by different members of a research organization. Finally, open source information is generally more timely and may be the only information available in the early stages of a crisis or emergency.

    Open source intelligence collection does have limitations. Often articles in military or scientific journals represent a theoretical or desired capability rather than an actual capability. Censorship may also limit the publication of key data needed to arrive at a full understanding of an adversary's actions, or the press may be used as part of a conscious deception effort.

    Computer Intrusion for Collection Operations

    It is unclear to what extent foreign intelligence services are using computer hackers to obtain proprietary data or sensitive government information, or whether they have developed the capability to use computer intrusion techniques to disrupt telecommunications activities. The KGB did, however, sponsor computer intrusion activities by the Hannover Hackers, and there is no reason to believe that these efforts have ceased. The Hannover Hackers were able to access at least 28 Government computer systems, and obtain data from them. They sold this data to the KGB. While none of this data was classified, much of it was sensitive, and classified information could potentially be derived from comparing this information with other data. It has also been alleged that the KGB has been involved in similar efforts with other hacker groups and that these operations included the remote introduction of logic bombs and other malicious code. [16] There is little doubt that many foreign intelligence services could obtain hese capabilities if they wished.[17] The ability of a group of Dutch hackers to obtain sensitive information from U.S. Army, Navy, and Air Force computer networks during Operations Desert Shield and Desert Storm serves as an example of this potential for access. Between April 1990 and May 1991, this group was able to penetrate computer systems at 34 different facilities. The group obtained information on logistics operations, equipment movement schedules, and weapons development programs. Information from one of the penetrated computer systems directly supported Desert Shield/Desert Storm operations. In a review of this incident the General Accounting Office concluded that a foreign intelligence service would have been able to derive significant understanding of U.S. Operations in the Persian Gulf from the information that the Dutch hackers were able to extract from DoD information systems.[18]

    All Source Intelligence

    The culmination of the intelligence cycle is the development of all source intelligence. All source intelligence incorporates information derived through HUMINT, SIGINT, IM[NT, MAS1NT, and OStNT. The intention of this type of effort is to develop reinforcing information and to use multiple sources to corroborate key data points. The advantage of an all source approach is that each of the intelligence disciplines is suited to collecting a particular type of data, which allows the intelligence organization to examine all facets of an intelligence target, and gain a better understanding of its operation. All source intelligence collection is the most formidable threat faced by the OPSEC program manager. Fortunately, only a few nations have the ability to mount such efforts. The following sections of this report examines the intelligence capabilities of adversary nations and groups.

    Sources

    1 - Interagency OPSEC Support Staff, Compendium of OPSEC Terms, Greenbelt, MD: IOSS, April 1991.

    2 - Bruce D. Berkowitz and Allan E. Goodman, StraJegic Intelligence for American National Security, Princeton, NJ: Princeton University Press, 1989.

    3 - The Joint Staff, Doctrine for Intelligence Support to Joint Operations, Washington, DC: Office of the Joint Chiefs of Staff. June 30. 1991.

    4 - Interagency OPSEC Support Staff, Compendium of OPSEC Terms, Greenbelt, MD: IOSS, April 1991.

    5 - Air Force Pamphlet 200-18, Target Intelligence Handbook: Unclassif ed Targeting Principles, Washington, DC: Department of the Air Force, October 1, 1990.

    6 - Suzanne Wood, Katherine L. Herbig, and Peter A. W. Lewis, American Espionage, 1945-1989, Monterey, CA: Defense Personnel Security Research and Education Center, 1990.

    7 - Defense Science Board, Report of the Defense Science Board Summer Study Task Force on Information Architecture for the Battlefield, Washington, DC: Office of the Under Secretary of Defense for Acquisition and Technology, October 1994.

    8 - Jeffrey Richelson, American Espionage and the Soviet Target, New York: William Morrow, 1987.

    9 Intelligence Community Staff, Glossary of Intelligence Terms and Definitions, Washington, DC: ICS, June 1989.

    10 - William Rosenau,"A Deafening Silence: U.S. Policy and the SIGINT Facility at Lourdes," Intelligence and National Security, 9:4 (October 1994), pp. 723-734.

    11 - Pan chromatic systems produce black and white imagery. Multispectral systems capture selected visible and non-visible wavelengths of the electromagnetic spectrum to develop images that provide information not available from the visible spectrum alone. These images provide the means to determine soil porosity, moisture content, heat distribution patterns, structural density, and vegetation growth. Synthetic aperture radar (SAR) uses a radar antenna with a narrow beam to develop a high resolution image. SAR provides an all weather/day/night imaging capability. Electro-optic imagery differs from optical imagery in that the first uses an electrical system imaging system to obtain a digital image, and the second type is essentially a photographic system that uses film as a medium. The advantage of electro-optic imagery is that digitized imagery can be transmitted for near real-time analysis, and can be manipulated or enhanced to emphasize desired features.

    12 - Daniel B. Sibbet, "Commercial Remote-Sensing," American Intelligence Journal, Spring/Summer 1993, p. 37, and Testimony of Robin Armani before the Senate Select Committee on Intelligence, Public Hearing on Commercial Remote Sensing, November 17. 1993.

    13 - On-Site Inspection Agency, "Fact Sheet: The Open Skies Treaty," May 1993, and U.S. Arms Control and Disarmament Agency, Treaty on Open Skies (Official Text), April 10, 1992.

    14 - Headquarters, U.S. Air Force, Target Intelligence Handbook: Unclassified Targeting Principles, Air Force Pamphlet 200-18, Volume 1, Washington, D.C., 1 October 1990, pp. 18-19.

    15 - ibid.. P. 19.

    16 - Peter Warren, "Technoterrorists: Growing Links Between Computer Technology and the Seedy Underworld of Terrorism, Organized Crime, and Spying." Computer Talk, June 19. 1989, D. 52.

    17 - Interview: DISA Center for Information System Security, November 3, 1993.

    18 - United States Senate, A Lesson of the Gulf War: National Security Requires Computer Security, June 19, 1991, Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, Washington, DC: USGPO.