Академический Документы
Профессиональный Документы
Культура Документы
Sigint redirects here. For other uses, see Sigint (disam- 1 History
biguation).
Signals intelligence (SIGINT) is intelligence-
1.1 Origins
Over the course of the First World War, the new method
of signals intelligence reached maturity.[3] Failure to
properly protect its communications fatally compromised
the Russian Army in its advance early in World War I
and led to their disastrous defeat by the Germans under
Ludendor and Hindenburg at the Battle of Tannenberg.
In 1918, French intercept personnel captured a message
written in the new ADFGVX cipher, which was cryptan-
alyzed by Georges Painvin. This gave the Allies advance
The last German message intercepted by the British during World warning of the German 1918 Spring oensive.
War II, signaling Germanys unconditional surrender
The British in particular built up great expertise in the
newly emerging eld of signals intelligence and code-
gathering by interception of signals, whether communica- breaking. On the declaration of war, Britain cut all Ger-
tions between people (communications intelligence man undersea cables.[4] This forced the Germans to use
abbreviated to COMINT) or from electronic signals either a telegraph line that connected through the British
not directly used in communication (electronic intelli- network and could be tapped, or through radio which
genceabbreviated to ELINT). Signals intelligence is a the British could then intercept.[5] Rear-Admiral Henry
subset of intelligence collection management. Oliver appointed Sir Alfred Ewing to establish an inter-
As sensitive information is often encrypted, signals intel- ception and decryption service at the Admiralty; Room
ligence often involves the use of cryptanalysis to decipher 40.[5] An interception service known as 'Y' service, to-
the messages. Trac analysisthe study of who is sig- gether with the post oce and Marconi stations grew
naling whom and in what quantityis also used to derive rapidly to the point where the British could intercept al-
information. most all ocial German messages.[5]
1
2 1 HISTORY
Unit 8200 (the SIGINT unit of the Israeli Intelligence Corps) base
on Mount Avital, Golan Heights
2 Technical denitions
3 Disciplines shared across the
The United States Department of Defense has dened the
term signals intelligence as: branches
Targeting is an output of the process of developing col- tical SIGINT requirement, where the larger aircraft tend
lection requirements: to be assigned strategic/national missions.
Before the detailed process of targeting begins, someone
1. An intelligence need considered in the al- has to decide there is a value in collecting information
location of intelligence resources. Within the about something. While it would be possible to direct
Department of Defense, these collection re- signals intelligence collection at a major sports event, the
quirements fulll the essential elements of in- systems would capture a great deal of noise, news signals,
formation and other intelligence needs of a and perhaps announcements in the stadium. If, however,
commander, or an agency. an anti-terrorist organization believed that a small group
would be trying to coordinate their eorts, using short-
2. An established intelligence need, val-
range unlicensed radios, at the event, SIGINT targeting of
idated against the appropriate allocation of
radios of that type would be reasonable. Targeting would
intelligence resources (as a requirement) to
not know where in the stadium the radios might be, or
fulll the essential elements of information
the exact frequency they are using; those are the functions
and other intelligence needs of an intelligence
of subsequent steps such as signal detection and direction
consumer.[15]
nding.
Once the decision to target is made, the various intercep-
3.2 Need for multiple, coordinated re- tion points need to cooperate, since resources are limited.
ceivers Knowing what interception equipment to use becomes
easier when a target country buys its radars and radios
First, atmospheric conditions, sunspots, the targets trans- from known manufacturers, or is given them as military
mission schedule and antenna characteristics, and other aid. National intelligence services keep libraries of de-
factors create uncertainty that a given signal intercept sen- vices manufactured by their own country and others, and
sor will be able to hear the signal of interest, even with then use a variety of techniques to learn what equipment
a geographically xed target and an opponent making no is acquired by a given country.
attempt to evade interception. Basic countermeasures Knowledge of physics and electronic engineering further
against interception include frequent changing of radio narrows the problem of what types of equipment might be
frequency, polarization, and other transmission charac- in use. An intelligence aircraft ying well outside the bor-
teristics. An intercept aircraft could not get o the ground ders of another country will listen for long-range search
if it had to carry antennas and receivers for every possible radars, not short-range re control radars that would be
frequency and signal type to deal with such countermea- used by a mobile air defense. Soldiers scouting the front
sures. lines of another army know that the other side will be
Second, locating the transmitters position is usually part using radios that must be portable and not have huge an-
of SIGINT. Triangulation and more sophisticated radio tennas.
location techniques, such as time of arrival methods,
require multiple receiving points at dierent locations.
These receivers send location-relevant information to a 3.4 Signal detection
central point, or perhaps to a distributed system in which
all participate, such that the information can be correlated Even if a signal is human communications (e.g., a radio),
and a location computed. the intelligence collection specialists have to know it ex-
ists. If the targeting function described above learns that
a country has a radar that operates in a certain frequency
3.3 Intercept management range, the rst step is to use a sensitive receiver, with one
or more antennas that listen in every direction, to nd an
Modern SIGINT systems, therefore, have substantial area where such a radar is operating. Once the radar is
communications among intercept platforms. Even if known to be in the area, the next step is to nd its location.
some platforms are clandestine, there is a broadcast of If operators know the probable frequencies of transmis-
information telling them where and how to look for sions of interest, they may use a set of receivers, preset to
signals.[16] A United States targeting system under devel- the frequencies of interest. These are the frequency (hor-
opment in the late 1990s, PSTS, constantly sends out in- izontal axis) versus power (vertical axis) produced at the
formation that helps the interceptors properly aim their transmitter, before any ltering of signals that do not add
antennas and tune their receivers. Larger intercept air- to the information being transmitted. Received energy
craft, such as the EP-3 or RC-135, have the on-board on a particular frequency may start a recorder, and alert a
capability to do some target analysis and planning, but human to listen to the signals if they are intelligible (i.e.,
others, such as the RC-12 GUARDRAIL, are completely COMINT). If the frequency is not known, the operators
under ground direction. GUARDRAIL aircraft are fairly may look for power on primary or sideband frequencies
small, and usually work in units of three to cover a tac- using a spectrum analyzer. Information from the spec-
3.6 Trac analysis 5
radio silence.
Trac analysis need not focus on human communica-
tions. For example, if the sequence of a radar signal,
followed by an exchange of targeting data and a conr-
mation, followed by observation of artillery re, this may
identify an automated counterbattery system. A radio sig-
nal that triggers navigational beacons could be a landing
aid system for an airstrip or helicopter pad that is intended
to be low-prole.
Patterns do emerge. Knowing a radio signal, with certain
characteristics, originating from a xed headquarters may
be strongly suggestive that a particular unit will soon move
out of its regular base. The contents of the message need
not be known to infer the movement.
There is an art as well as science of trac analysis. Ex-
pert analysts develop a sense for what is real and what is
deceptive. Harry Kidder, for example, was one of the star
cryptanalysts of World War II, a star hidden behind the
secret curtain of SIGINT.[17] EOB and related data ow
3.7 Electronic order of battle Signals intelligence units will identify changes in the
EOB, which might indicate enemy unit movement,
Generating an electronic order of battle (EOB) requires changes in command relationships, and increases or de-
identifying SIGINT emitters in an area of interest, de- creases in capability.
termining their geographic location or range of mobility, Using the COMINT gathering method enables the intel-
characterizing their signals, and, where possible, deter- ligence ocer to produce an electronic order of battle by
mining their role in the broader organizational order of trac analysis and content analysis among several enemy
battle. EOB covers both COMINT and ELINT.[18] The units. For example, if the following messages were inter-
Defense Intelligence Agency maintains an EOB by loca- cepted:
tion. The Joint Spectrum Center (JSC) of the Defense
Information Systems Agency supplements this location
database with ve more technical databases: 1. U1 from U2, requesting permission to
proceed to checkpoint X.
1. FRRS: Frequency Resource Record Sys- 2. U2 from U1, approved. please report at
tem arrival.
2. BEI: Background Environment Informa- 3. (20 minutes later) U1 from U2, all vehi-
tion cles have arrived to checkpoint X.
3. SCS: Spectrum Certication System
This sequence shows that there are two units in the bat-
4. EC/S: Equipment Characteristics/Space
tleeld, unit 1 is mobile, while unit 2 is in a higher hi-
5. TACDB: platform lists, sorted by nomen- erarchical level, perhaps a command post. One can also
clature, which contain links to the C-E understand that unit 1 moved from one point to another
equipment complement of each platform, which are distant from each 20 minutes with a vehi-
with links to the parametric data for each cle. If these are regular reports over a period of time,
piece of equipment, military unit lists and they might reveal a patrol pattern. Direction-nding and
their subordinate units with equipment radiofrequency MASINT could help conrm that the traf-
used by each unit. c is not deception.
The EOB buildup process is divided as following:
For example, several voice transmitters might be identi-
ed as the command net (i.e., top commander and direct
reports) in a tank battalion or tank-heavy task force. An- Signal separation
other set of transmitters might identify the logistic net for Measurements optimization
that same unit. An inventory of ELINT sources might
Data Fusion
identify the medium- and long-range counter-artillery
radars in a given area. Networks build-up
4.1 Voice interception 7
Separation of the intercepted spectrum and the signals 4. The time and duration of transmission, and the
intercepted from each sensors must take place in an ex- schedule if it is a periodic transmission
tremely small period of time, in order to separate the def-
erent signals to dierent transmitters in the battleeld.
5. The frequencies and other technical characteristics
The complexity of the separation process depends on the
of their transmission
complexity of the transmission methods (e.g., hopping or
time division multiple access (TDMA)).
6. If the transmission is encrypted or not, and if it can
By gathering and clustering data from each sensor, the
be decrypted. If it is possible to intercept either an
measurements of the direction of signals can be opti-
originally transmitted cleartext or obtain it through
mized and get much more accurate than the basic mea-
cryptanalysis, the language of the communication
surements of a standard direction nding sensor.[19] By
and a translation (when needed).
calculating larger samples of the sensors output data in
near real-time, together with historical information of sig-
nals, better results are achieved. 7. The addresses, if the signal is not a general broad-
Data fusion correlates data samples from dierent fre- cast and if addresses are retrievable from the mes-
quencies from the same sensor, same being conrmed sage. These stations may also be COMINT (e.g., a
by direction nding or radiofrequency MASINT. If an conrmation of the message or a response message),
emitter is mobile, direction nding, other than discover- ELINT (e.g., a navigation beacon being activated)
ing a repetitive pattern of movement, is of limited value or both. Rather than, or in addition to, an address
in determining if a sensor is unique. MASINT then be- or other identier, there may be information on the
comes more informative, as individual transmitters and location and signal characteristics of the responder.
antennas may have unique side lobes, unintentional radi-
ation, pulse timing, etc.
Network build-up, or analysis of emitters (communi- 4.1 Voice interception
cation transmitters) in a target region over a sucient
period of time, enables creation of the communications A basic COMINT technique is to listen for voice commu-
ows of a battleeld.[20] nications, usually over radio but possibly leaking from
telephones or from wiretaps. If the voice communica-
tions are encrypted, trac analysis may still give infor-
mation.
4 COMINT
In the Second World War, for security the United States
COMINT redirects here. For other uses, see COMINT used Native American volunteer communicators known
(disambiguation). as code talkers, who used languages such as Navajo,
Comanche and Choctaw, which would be understood by
few people, even in the U.S. Even within these uncom-
COMINT (Communications Intelligence) is a sub- mon languages, the code talkers used specialized codes,
category of signals intelligence that engages in dealing so a buttery might be a specic Japanese aircraft.
with messages or voice information derived from the in- British forces made limited use of Welsh speakers for the
terception of foreign communications. It should be noted same reason.
that COMINT is commonly referred to as SIGINT, which
can cause confusion when talking about the broader in- While modern electronic encryption does away with the
telligence disciplines. The US Joint Chiefs of Sta de- need for armies to use obscure languages, it is possible
nes it as Technical information and intelligence derived that some irregular groups might use rare dialects that few
from foreign communications by other than the intended outside their ethnic group would understand.
recipients.[15]
COMINT, which is dened to be communications among
people, will reveal some or all of the following: 4.2 Text interception
1. Who is transmitting Morse code interception was once very important, but
Morse code telegraphy is now obsolete in the west-
2. Where they are located, and, if the transmitter is ern world, although possibly used by special operations
moving, the report may give a plot of the signal forces. Such forces, however, now have portable crypto-
against location graphic equipment. Morse code is still used by military
forces of former Soviet Union countries.
3. If known, the organizational function of the trans- Specialists scan radio frequencies for character sequences
mitter (e.g., electronic mail) and fax.
8 5 ELECTRONIC SIGNALS INTELLIGENCE
o their coast, aircraft near or in their airspace, or by 5.3 ELINT and ESM
satellite.
Electronic support measures (ESM) or Electronic
Surveillance Measures are really ELINT techniques us-
ing various Electronic Surveillance Systems, but the term is
5.1 Complementary relationship to used in the specic context of tactical warfare. ESM give
COMINT the information needed for electronic attack (EA) such
as jamming, or directional bearings (compass angle) to a
Combining other sources of information and ELINT al- target in signals intercept such as in the HUFF-DUFF Ra-
lows trac analysis to be performed on electronic emis- dio Direction Finding (RDF) systems so critically impor-
sions which contain human encoded messages. The tant during the WW-II Battle of the Atlantic. After WW-
method of analysis diers from SIGINT in that any hu- II, the RDF originally applied in only communications
man encoded message which is in the electronic trans- was broadened into systems to also take in ELINT from
mission is not analyzed during ELINT. What is of inter- radar bandwidths and lower frequency communications
est is the type of electronic transmission and its location. systems, giving birth to a family of NATO ESM systems,
For example, during the Battle of the Atlantic in World such as the shipboard US AN/WLR-1[22] AN/WLR-6
War II, Ultra COMINT was not always available because systems and comparable airborne units. EA is also called
Bletchley Park was not always able to read the U-boat electronic counter-measures (ECM). ESM provides in-
Enigma trac. But "Hu-Du" (High Frequency Di- formation needed for electronic counter-counter mea-
rection Finder) was still able to nd where the U-boats sures (ECCM), such as understanding a spoong or jam-
were by analysis of radio transmissions and the positions ming mode so one can change ones radar characteristics
through triangulation from the direction located by two to avoid them.
or more Hu-Du systems. The Admiralty was able to
use this information to plot courses which took convoys
away from high concentrations of U-boats. 5.4 ELINT for meaconing
Yet other ELINT disciplines include intercepting and
Meaconing[23] is the combined intelligence and electronic
analyzing enemy weapons control signals, or the
warfare of learning the characteristics of enemy naviga-
Identication, friend or foe responses from transponders
tion aids, such as radio beacons, and retransmitting them
in aircraft used to distinguish enemy craft from friendly
with incorrect information.
ones.
A very common area of ELINT is intercepting radars and Main article: FISINT
learning their locations and operating procedures. At-
tacking forces may be able to avoid the coverage of cer- FISINT (Foreign instrumentation signals intelligence) is
tain radars, or, knowing their characteristics, electronic a sub-category of SIGINT, monitoring primarily non-
warfare units may jam radars or send them deceptive sig- human communication. Foreign instrumentation signals
nals. Confusing a radar electronically is called a soft include (but not limited to) telemetry (TELINT), tracking
kill, but military units will also send specialized missiles systems, and video data links. TELINT is an important
at radars, or bomb them, to get a hard kill. Some mod- part of national means of technical verication for arms
ern air-to-air missiles also have radar homing guidance control.
systems, particularly for use against large airborne radars.
Knowing where each surface-to-air missile and anti-
5.6 Counter-ELINT
aircraft artillery system is and its type means that air raids
can be plotted to avoid the most heavily defended areas
Still at the research level are techniques that can only be
and to y on a ight prole which will give the aircraft the
described as counter-ELINT, which would be part of a
best chance of evading ground re and ghter patrols. It
SEAD campaign. It may be informative to compare and
also allows for the jamming or spoong of the enemys de-
contrast counter-ELINT with ECCM.
fense network (see electronic warfare). Good electronic
intelligence can be very important to stealth operations;
stealth aircraft are not totally undetectable and need to
know which areas to avoid. Similarly, conventional air- 6 SIGINT versus MASINT
craft need to know where xed or semi-mobile air defense
systems are so that they can shut them down or y around Main article: Measurement and signature intelligence
them. Signals intelligence and measurement and signature in-
10 8 SEE ALSO
7 Legality
Since the invention of the radio, the international consen-
sus has been that the radio-waves are no ones property,
and thus the interception itself is not illegal. There can
however be national laws on who is allowed to collect,
store and process radio trac, and for what purposes.
Monitoring trac in cables (i.e. telephone and Internet)
is far more controversial, since it most of the time re-
quires physical access to the cable and thereby violating
ownership and expected privacy.
[7] Code Breaking and Wireless Intercepts. [23] US Army (17 July 1990). Chapter 4: Meaconing, In-
trusion, Jamming, and Interference Reporting. Field
[8] Johnson, John (1997). The Evolution of British Sigint: Manual 2333, Communications Techniques: Electronic
16531939. HMSO. p. 44. ASIN B002ALSXTC. Counter-Countermeasures. FM 2333. Retrieved 1 Oc-
tober 2007.
[9] Smith, Michael (2001). GC&CS and the First Cold
War. In Smith, Michael; Erskine, Ralph. Action This [24] Interagency OPSEC Support Sta (IOSS) (May 1996).
Day: Bletchley Park from the Breaking of the Enigma Code Operations Security Intelligence Threat Handbook: Sec-
to the Birth of the Modern Computer. Bantam Press. pp. tion 2, Intelligence Collection Activities and Disciplines.
1617. ISBN 978-0-593-04910-5. IOSS Section 2. Retrieved 3 October 2007.
11 External links
Part I of IV Articles On Evolution of Army Signal
Corps COMINT and SIGINT into NSA
NSAs overview of SIGINT
12.2 Images
File:120715_Grondstation_Nationale_SIGINT_Organisatie_(NSO)_Burum_Fr_NL.jpg Source: https://upload.wikimedia.org/
wikipedia/commons/7/70/120715_Grondstation_Nationale_SIGINT_Organisatie_%28NSO%29_Burum_Fr_NL.jpg License: CC
BY-SA 3.0 Contributors: Own work Original artist: Wutsje
File:A52_Oste.jpg Source: https://upload.wikimedia.org/wikipedia/commons/f/f0/A52_Oste.jpg License: CC-BY-SA-3.0 Contributors:
Self-photographed Original artist: KleeBuchemer 19:37, 18. Aug. 2007 (CEST)
File:Bletchley_Park_last_German_intercept.JPG Source: https://upload.wikimedia.org/wikipedia/commons/d/dd/Bletchley_Park_
last_German_intercept.JPG License: CC-BY-SA-3.0 Contributors: Created by Magnus Manske. Original artist: Magnus Manske
File:Colossus.jpg Source: https://upload.wikimedia.org/wikipedia/commons/4/4b/Colossus.jpg License: Public domain Contributors:
This le is from the collections of The National Archives (United Kingdom), catalogued under document record FO850/234. For high
quality reproductions of any item from The National Archives collection please contact the image library.
Original artist: Unknown<a href='//www.wikidata.org/wiki/Q4233718' title='wikidata:Q4233718'><img alt='wikidata:Q4233718'
src='https://upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/20px-Wikidata-logo.svg.png' width='20'
height='11' srcset='https://upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/30px-Wikidata-logo.svg.png 1.5x,
https://upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/40px-Wikidata-logo.svg.png 2x' data-le-width='1050'
data-le-height='590' /></a>
File:DirectionalSpectra.png Source: https://upload.wikimedia.org/wikipedia/commons/f/f0/DirectionalSpectra.png License: CC BY 3.0
Contributors: Own work Original artist: Hcberkowitz
File:Fbi_duquesne.jpg Source: https://upload.wikimedia.org/wikipedia/commons/0/07/Fbi_duquesne.jpg License: Public domain Con-
tributors: ? Original artist: ?
File:Har_Avital.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/e3/Har_Avital.jpg License: CC BY-SA 2.0 Contribu-
tors: GCC Trip To Israel in 2007 Original artist: Marion Doss
File:JSC-Databases-and-Flow.GIF Source: https://upload.wikimedia.org/wikipedia/commons/2/2f/JSC-Databases-and-Flow.GIF Li-
cense: Public domain Contributors: http://www.gordon.army.mil/AC/Fall/Fall%2001/JSCmtrc.htm Original artist: ?
File:Menwith-hill-radomes.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/e0/Menwith-hill-radomes.jpg License:
Public domain Contributors: Own work Original artist: Matt Crypto
File:SAR-Lupe.jpg Source: https://upload.wikimedia.org/wikipedia/commons/4/4b/SAR-Lupe.jpg License: GFDL Contributors: http:
//ru.wikipedia.org/wiki/%D0%A4%D0%B0%D0%B9%D0%BB:SarLupe.JPG Original artist: Marshall80
File:SpectrumAnalyzer-Superhet.png Source: https://upload.wikimedia.org/wikipedia/commons/8/8a/SpectrumAnalyzer-Superhet.
png License: CC BY 3.0 Contributors: Own work Original artist: Hcberkowitz
File:Ztel2.jpg Source: https://upload.wikimedia.org/wikipedia/commons/1/14/Ztel2.jpg License: Public domain Contributors: ? Original
artist: ?