Evaluation VHF Intercept and Direction Finding Systems

Total Page:16

File Type:pdf, Size:1020Kb

Evaluation VHF Intercept and Direction Finding Systems Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1989 Evaluation VHF intercept and direction finding systems. Siddiqui, Muhammad Aleem. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/25913 UNCLASSIFIED S.'URiTY CLASS. FiCAT'Orj Qi^ THiS PAGt form Approved REPORT DOCUMENTATION PAGE 0MB No 0704 on REPORT SECURITY CLASSIFICATION lb RESTRICTIVE MARK NGS Unclassified SECURITY CLASSIFICATION AUTHORITY 3 DISTRIBUTION 'AVAHABlLiTV OF PE.-OP" Approved for public release; DECLASSIFICATION ' DOWNGRADING SCHEDULE distribution is unlimited PERFORMING ORGANIZATION REPORT NUMBER{S) 5 MONITORING ORGANIZATION REPORT NUMBER(S) NAME OF PERFORMING ORGANIZATION 6b OFFICE SYMBOL 7a NAME OF MONITORING ORGANIZATION (If applicable) ^aval Postgraduate Schoo] 61 Naval Postgraduate School ADDRESS {City, State, and ZIP Code) 7t) ADDRESS (C/fy State and ZIP Code) Monterey, California 93943-5000 Monterey, California 93943-5000 NAME OF FUNDING SPONSORING Bb OFFICE SYMBOL 9 PROCUREMENT INSTRUMENT IDENTIFICATION NUMBEf ORGANIZATION (If applicable) ADDRESS(C/f> State and ZIP Code) in SOURCE OF FUNDING NjMBE»S P!^'OGRAM PROJECT TASr vvorn unit Element no NO NO -ccession no i TITLE (Include Security Classification) EVALUATION OF VHF INTERCEPT AND DIRECTION FINDING SYSTEMS ! PERSONAL AUTHOR'S; SIDDIQUI, Muhammad Aleem ia TYPE OF REPORT 3b TIME COVERED ^ DATE OF REPOR" (Year Month Day) 3 PAGE COUN' Master's Thesis FROM TO 1989, September 91 j SUPPLEMENTARY NOTATION COSATl CODES 18 SUBJECT TERMS (Continue on revefse if necessar-y and identify by block number) ELD GROUP SUB-GROUP Electronic Warfare, Interception, Direction Finding ) ABSTRACT {Continue on reverse if necessary and identify by block number) This thesis evaluates VHF Intercept and Direction Finding (DF) collection systems developed by ESL International, Watkins Johnson, and HRB Singer for induction into a divisional level signal battalion of the Pakistan ^rmy. The introduction of the proposed system is expected to enhance Bxisting intercept and Direction Finding (DF) Capabilities. This thesis Bvaluates the three systems on the basis of performance, design, and Bupportability characteristics. In the process each system element is further broken into subelements composed of significant intercept and DF system characteristics. The expected threat environment and the capabil- ities of modern intercept and DF systems provided practical and workable rationale and criteria for this purpose. rhe conclusion is that the system developed by ESL International offers significant capabilities of meeting the needs of expected division;^] IpvpI . D DISTRIBUTION . AVAILABILITY OF ABSTRACT 21 ABSTRACT SECUR'T-- C ASSinCATiON [^ UNCLASSIFIED UNLIMITED D SAME AS RPT D DTIC USERS Unclassified a NAME OF RESPONSIBLE INDIVIDUAL 22b TELEPHONE f/nc/ude Area Code) :2c OFFICE SYMBOl Donald L. Walters 408-646-2267 61We 3 Form 1473, JUN 86 Previous edition: are obsolete SECURiTv CLASSif iCAI l ofy 0^ S/N 0102-LF-01A-6603 Unclassified T243559 Unclassified SECURITY ClAS = !'^iCATIO\ OF ^Hi- PAGE Block 19, Abstract. threat environments. A major recommendation is that the system capabilities be verified by carrying out a dedicated testing operational program before finalizing the acquisition proposal DD Form 1473, JUM 86 ^ir.-- 11 Unclassified Approved for Public Release; distribution is unlimited EVALUATION OF VHF INTERCEPT AND DIRECTION FINDING SYSTEMS by Muhammad Aleem Siddiqui Major, Pakistan Army B.S., Military College of Signal, Pakistan, 1986 Submitted in partial fulfillment of the Requirements for the degree MASTER OF SCIENCE IN SYSTEMS ENGINEERING (ELECTRONIC WARFARE) from the NAVAL POSTGRADUATE SCHOOL \ \ y, \ September 1989 C.J ABSTRACT This thesis evaluates VHF Intercept and Direction Finding (DP) collection systems developed by ESL International, Watkin Johnson, and HRB Singer for induction into a divisional level signal battalion of the Pakistan army. The introduction of the proposed system is expected to enhance existing intercept and Direction Finding (DF) capabilities. This thesis evaluates the three systems on the basis of performance, design, and supportability characteristics. In the process each system element is further broken into subelements composed of significant intercept and DF system characteristics. The expected threat environment and the capabilities of modern intercept and DF systems provided practical and workable rationale and criteria for this purpose. The conclusion is that the system developed by ESL International offers significant capabilities of meeting the needs of expected divisional level threat environments. A major recommendation is that the system capabilities be verified by carrying out a dedicated operational testing program before finalizing the acquisition proposal. IV DTTDT,r!YT- 13 AVAL rC L MOIJTEBSY. C- TABLE OF CONTENTS I. INTRODUCTION 1 A. GENERAL 1 B. OBJECTIVE 3 II. ELECTRONIC WARFARE (EW) MISSION CATEGORIES .... 4 A. GENERAL 4 B. ELECTRONIC RECONNAISSANCE (ER) 5 C. ELECTRONIC COUNTERMEASURES (ECM) 7 D. ELECTRONIC COUNTER - COUNTERMEASURES (ECCM) . 10 III. CONCEPT OF COMBAT COMMUNICATION IN A DIVISION . 13 A. ELECTROMAGNETIC ENVIRONMENT 13 B. ROLE AND RESPONSIBILITIES OF THE SIGNAL CORPS . 14 C. COMMUNICATION TECHNIQUES 15 D. RADIO 15 E. WIRE AND CABLE SYSTEM 17 F. RADIO RELAY 18 G. MESSENGER SERVICE 19 H. COMMUNICATION FOR DEFENSE 19 I. COMMUNICATION FOR OFFENSIVE OPERATIONS .... 21 J. COMMUNICATION FOR ATTACK AND PURSUIT PHASE . 22 K. COMMUNICATION FOR WITHDRAWAL 2 3 IV. MODERN TECHNOLOGICAL CONCEPTS IN COMMUNICATION . 2 6 A. GENERAL 26 V B. SPREAD SPECTRUM COMMUNICATION 27 C. METEOR BURST COMMUNICATION (MBC) 29 D. FIBER OPTICS 31 E. MILLIMETER WAVELENGTH 3 4 F. LOCAL AREA NETWORKS (LAN) 35 G. SATELLITE COMMUNICATION 3 6 V. INTERCEPT AND DIRECTION FINDING SYSTEMS 4 A. GENERAL 4 B. INTERCEPT RECEIVERS 41 C. DF SYSTEM 4 4 j/ D. CLASSIFICATION OF DF SYSTEM 46 1. Scalar Systems 46 2. Vector or Phaser Systems 49 E. ESM SYSTEM IN OPERATIONS OF WAR 51 VI. SYSTEM EVALUATION 53 A. GENERAL 53 B. LIMITATIONS 54 C. EVALUATION METHODOLOGY AND CRITERIA 54 1. Performance Characteristics 55 2. Design Characteristics 61 3. Multipliers 63 D. SYSTEM COMPARISON 63 E. SUMMARY 7 2 VII. CONCLUSIONS AND RECOMMENDATIONS 73 A. CONCLUSIONS 73 VI 1 B. RECOMMENDATIONS 74 APPENDIX A: LIST OF MANUFACTURERS 7 6 APPENDIX B: FIGURES 78 LIST OF REFERENCES 8 BIBLIOGRAPHY 81 INITIAL DISTRIBUTION LIST 82 VI I . INTRODUCTION A. GENERAL Electronic devices have become an essential part of a military force for command and control, logistic support and control of weapons. On one hand, use of such electronic devices extend excellent command and control opportunities, and on the other, their increased use has inherent risks and vulnerabilities. These dangers have established themselves as important weapons of war. The threat of Electronic Warfare (EW) is fact and in any future war we will have to face an organized electronic warfare effort by the enemy. Electronic warfare is becoming one of the most effective weapons in the armory of any nation facing a sophisticated threat. Properly used in support of a tactical plan, electronic warfare can turn out to be a battle winning factor. Therefore, the need for having a sizable capability in this area must be considered. Because of its clandestine nature and the high security barriers erected around it, EW is one of the least-understood aspects of military activity of our times and has for many come to represent a "black art" to which only a chosen elite are permitted access. To some extent this is necessary, since electronic warfare must by its nature keep its secrets, as far as possible, to be effective. On the other hand, electronic warfare must absorb the latest advances in electronics technology if they are perceived to be of potential value. Despite these factors, electronic warfare is not fundamentally a complex subject and is as old as the technology of electronics itself. Historically, electronic warfare in its most basic form, that of interception of other people's communication has been with us almost since the introduction of communication via radio. As soon as radio communications came into general use, there was always some unauthorized person prepared to eavesdrop on them. Apart from realizing that he may be overheard, there was little that the user could do to counter this. In the modern electronic battle field, communication plays a pivotal role to control forces, to know their deployment and maneuvers, and to fire weapons. Thus, there are tactical reasons for the presence and activity of each transmitter. Each higher headquarters needs two-way communications with each of its subordinate headquarters; each element of a fire control network must talk to other elements; and each mobile unit must communicate with its commander. Under this saturated communication scenario modern intercept and direction finding (DF) systems provide timely and accurate information that allow a decision maker to determine the strength and location of enemy forces and enemy tactical intentions. They also support electronic countermeasures (ECM) activities, which can prevent the enemy from effectively controlling his forces or using his weapons. Thus a clear understanding of the theoretical basis of selected electronic warfare (EW) missions, the concept of combat communication, and the characteristics of the latest intercept and DF systems is essential. B. OBJECTIVE The objective of this thesis is to evaluate the technological
Recommended publications
  • The Crossing of Heaven
    The Crossing of Heaven Memoirs of a Mathematician Bearbeitet von Karl Gustafson, Ioannis Antoniou 1. Auflage 2012. Buch. xvi, 176 S. Hardcover ISBN 978 3 642 22557 4 Format (B x L): 15,5 x 23,5 cm Gewicht: 456 g Weitere Fachgebiete > Mathematik > Numerik und Wissenschaftliches Rechnen > Angewandte Mathematik, Mathematische Modelle Zu Inhaltsverzeichnis schnell und portofrei erhältlich bei Die Online-Fachbuchhandlung beck-shop.de ist spezialisiert auf Fachbücher, insbesondere Recht, Steuern und Wirtschaft. Im Sortiment finden Sie alle Medien (Bücher, Zeitschriften, CDs, eBooks, etc.) aller Verlage. Ergänzt wird das Programm durch Services wie Neuerscheinungsdienst oder Zusammenstellungen von Büchern zu Sonderpreisen. Der Shop führt mehr als 8 Millionen Produkte. 4. Computers and Espionage ...and the world’s first spy satellite... It was 1959 and the Cold War was escalating steadily, moving from a state of palpable sustained tension toward the overt threat to global peace to be posed by the 1962 Cuban Missile Crisis – the closest the world has ever come to nuclear war. Quite by chance, I found myself thrust into this vortex, involved in top-level espionage work. I would soon write the software for the world’s first spy satellite. It was a summer romance, in fact, that that led me unwittingly to this particular role in history. In 1958 I had fallen for a stunning young woman from the Washington, D.C., area, who had come out to Boulder for summer school. So while the world was consumed by the escalating political and ideological tensions, nuclear arms competition, and Space Race, I was increasingly consumed by thoughts of Phyllis.
    [Show full text]
  • 8200.1D United States Standard Flight Inspection Manual
    DEPARTMENT OF THE ARMY TECHNICAL MANUAL TM 95-225 DEPARTMENT OF THE NAVY MANUAL NAVAIR 16-1-520 DEPARTMENT OF THE AIR FORCE MANUAL AFMAN 11-225 FEDERAL AVIATION ADMINISTRATION ORDER 8200.1D UNITED STATES STANDARD FLIGHT INSPECTION MANUAL April 2015 DEPARTMENTS OF THE ARMY, THE NAVY, AND THE AIR FORCE AND THE FEDERAL AVIATION ADMINISTRATION DISTRIBUTION: Electronic Initiated By: AJW-331 RECORD OF CHANGES DIRECTIVE NO. 8200.1D CHANGE SUPPLEMENTS OPTIONAL CHANGE SUPPLEMENTS OPTIONAL TO TO BASIC BASIC The material contained herein was formerly issued as the United States Standard Flight Inspection Manual, dated December 1956. The second edition incorporated the technical material contained in the United States Standard Flight Inspection Manual and revisions thereto and was issued as the United States Standard Facilities Flight Check Manual, dated December 1960. The third edition superseded the second edition of the United States Standard Facilities Flight Check Manual; Department of Army Technical Manual TM-11-2557-25; Department of Navy Manual NAVWEP 16-1-520; Department of the Air Force Manual AFM 55-6; United States Coast Guard Manual CG-317. FAA Order 8200.1A was a revision of the third edition of the United States Standard Flight Inspection Manual, FAA OA P 8200.1; Department of the Army Technical Manual TM 95-225; Department of the Navy Manual NAVAIR 16-1-520; Department of the Air Force Manual AFMAN 11-225; United States Coast Guard Manual CG-317. FAA Order 8200.1B, dated January 2, 2003, was a revision of FAA Order 8200.1A. FAA Order 8200.1C, dated October 1, 2005, was a revision of FAA Order 8200.1B.
    [Show full text]
  • Methods of Radio Direction Finding As an Aid to Navigation
    FWD : MWB Letter 1-6 DP PA RT*«ENT OF COMMERCE Circular BUREAU OF STANDARDS No. 56 WASHINGTON (March 27, 1923.)* 4 METHODS OF RADIO DIRECTION F$JDJipG AS AN AID TO NAVIGATION; THE RELATIVE ADVANTAGES OB£&fmTING THE DIRECTION FINDER ON SHORg$tgJFcN SHIPBOARD By F. W, Dunmo:^, Associate Physicist Now that the great value of the radio direction finder as an aid to navigation is being generally recognized, consider- able importance attaches to the question whether Its proper location is on shipboard, in the hands of the navigator, or on shore. The essential part of a radio direction finding equipment or '‘radio compass'' consists of a coil of wire usually wound on a frame from four to five feet square, so mounted as to be rotatable about a vertical axis. Suitable radio receiving apparatus is connected to this coil for the reception of the radio beacon signals. The construction and operation of the direction finder have been discussed in detail in Bureau of Standards Scientific Paper No. 438, by F.A.Kolster and F.W. Dunmore, to which the reader may refer for further . informa- tion.* The present paper is concerned primarily with a com- parison of the relative advantages of the location of the •direction finder on shore and on shipboard, The two methods may be briefly described as follows; 1. Direction Finder on Shore. --This method, usually con- sists in the use of two or more radio direction finder station installations on shore, each of these compass stations being connected by wire to a controlling transmitting station.
    [Show full text]
  • A Short History of Army Intelligence
    A Short History of Army Intelligence by Michael E. Bigelow, Command Historian, U.S. Army Intelligence and Security Command Introduction On July 1, 2012, the Military Intelligence (MI) Branch turned fi fty years old. When it was established in 1962, it was the Army’s fi rst new branch since the Transportation Corps had been formed twenty years earlier. Today, it remains one of the youngest of the Army’s fi fteen basic branches (only Aviation and Special Forces are newer). Yet, while the MI Branch is a relatively recent addition, intelligence operations and functions in the Army stretch back to the Revolutionary War. This article will trace the development of Army Intelligence since the 18th century. This evolution was marked by a slow, but steady progress in establishing itself as a permanent and essential component of the Army and its operations. Army Intelligence in the Revolutionary War In July 1775, GEN George Washington assumed command of the newly established Continental Army near Boston, Massachusetts. Over the next eight years, he dem- onstrated a keen understanding of the importance of MI. Facing British forces that usually outmatched and often outnumbered his own, Washington needed good intelligence to exploit any weaknesses of his adversary while masking those of his own army. With intelligence so imperative to his army’s success, Washington acted as his own chief of intelligence and personally scrutinized the information that came into his headquarters. To gather information about the enemy, the American com- mander depended on the traditional intelligence sources avail- able in the 18th century: scouts and spies.
    [Show full text]
  • FM 24-18. Tactical Single-Channel Radio Communications
    FM 24-18 TABLE OF CONTENTS RDL Document Homepage Information HEADQUARTERS DEPARTMENT OF THE ARMY WASHINGTON, D.C. 30 SEPTEMBER 1987 FM 24-18 TACTICAL SINGLE- CHANNEL RADIO COMMUNICATIONS TECHNIQUES TABLE OF CONTENTS I. PREFACE II. CHAPTER 1 INTRODUCTION TO SINGLE-CHANNEL RADIO COMMUNICATIONS III. CHAPTER 2 RADIO PRINCIPLES Section I. Theory and Propagation Section II. Types of Modulation and Methods of Transmission IV. CHAPTER 3 ANTENNAS http://www.adtdl.army.mil/cgi-bin/atdl.dll/fm/24-18/fm24-18.htm (1 of 3) [1/11/2002 1:54:49 PM] FM 24-18 TABLE OF CONTENTS Section I. Requirement and Function Section II. Characteristics Section III. Types of Antennas Section IV. Field Repair and Expedients V. CHAPTER 4 PRACTICAL CONSIDERATIONS IN OPERATING SINGLE-CHANNEL RADIOS Section I. Siting Considerations Section II. Transmitter Characteristics and Operator's Skills Section III. Transmission Paths Section IV. Receiver Characteristics and Operator's Skills VI. CHAPTER 5 RADIO OPERATING TECHNIQUES Section I. General Operating Instructions and SOI Section II. Radiotelegraph Procedures Section III. Radiotelephone and Radio Teletypewriter Procedures VII. CHAPTER 6 ELECTRONIC WARFARE VIII. CHAPTER 7 RADIO OPERATIONS UNDER UNUSUAL CONDITIONS Section I. Operations in Arcticlike Areas Section II. Operations in Jungle Areas Section III. Operations in Desert Areas Section IV. Operations in Mountainous Areas Section V. Operations in Special Environments IX. CHAPTER 8 SPECIAL OPERATIONS AND INTEROPERABILITY TECHNIQUES Section I. Retransmission and Remote Control Operations Section II. Secure Operations Section III. Equipment Compatibility and Netting Procedures X. APPENDIX A POWER SOURCES http://www.adtdl.army.mil/cgi-bin/atdl.dll/fm/24-18/fm24-18.htm (2 of 3) [1/11/2002 1:54:49 PM] FM 24-18 TABLE OF CONTENTS XI.
    [Show full text]
  • Human Intelligence Collector Operations, FM 2-22.3
    *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION 1-1 Intelligence Battlefield Operating System 1-1 Intelligence Process 1-1 Human Intelligence 1-4 HUMINT Source 1-4 HUMINT Collection and Related Activities 1-7 Traits of a HUMINT Collector 1-1 0 Required Areas of Knowledge 1-12 Capabilities and Limitations 1-13 Chapter 2 HUMAN INTELLIGENCE STRUCTURE 2-1 Organization and Structure 2-1 HUMINT Control Organizations 2-2 HUMINT Analysis and Production Organizations 2-6 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and reyulations. 'This publication supersedeJyM 34-52, 28 September 1992, and ST 2-22.7, Tactical Human Intelligence and Counterintelligence Operations, April 2002. PENTAGON LmRARY \" "j MrtlTARY OOCUMENTI WASHINGTON, DC 20310 6 September 2006 FM 2-22.3 FM 2-22.3 ------------­ Chapter 3 HUMINT IN SUPPORT OF ARMY OPERATIONS 3-1 Offensive Operations ...............................•............................................................ 3-1 Defensive Operations 3-2 Stability and Reconstruction Operations 3-3 Civil Support Operations 3-7 Military Operations in Urban Environment.. 3-8 HUMINT Collection Environments 3-8 EAC HUMINT 3-9 Joint, Combined, and DOD HUMINT Organizations 3-10 Chapter 4 HUMINT OPERATIONS PLANNING AND MANAGEMENT .4-1 HUMINT and the Operations Process .4-1 HUMINT Command and Control .4-3 Technical Control.
    [Show full text]
  • For R&S®RAMON Radiomonitoring Software
    R&S®RAMON Radiomonitoring Software For radiomonitoring and radiolocation systems Product Brochure | 04.00 | Brochure Product Radiomonitoring Radiolocation & RAMON_bro_en_5214-3152-12.indd 1 31.03.2015 14:30:49 Systems using the R&S®RAMON software are intended for R&S®RAMON specific spectrum monitoring tasks, government authori- ties entrusted with public safety and security missions and for the armed forces. They are delivered as complete, turn- Radiomonitoring key systems and support a wide range of tasks, including: ❙ Collection of information as a basis for political decisions ❙ Border protection (prevention of contraband trade and Software illegal border crossings) ❙ Personal and property protection ❙ Location finding of interference signals At a glance ❙ COMINT/CESM for military missions Systems based on R&S®RAMON include Rohde & Schwarz The R&S®RAMON software modules are used as radiomonitoring and radiolocation equipment as well as core components in advanced radiomonitoring and IT components, communications systems and the modu- radiolocation systems. The R&S®RAMON software lar R&S®RAMON software, which provides the interface to the user. covers a broad scope of functions: It can be used to control the equipment connected to a computer, Rohde & Schwarz also offers special software modules de- to store and analyze the data delivered by the veloped for military use, e.g. in communications electronic equipment, to control and monitor the information countermeasures (CECM) systems. These modules are flow in a networked system comprising multiple subject to export control regulations, and are described in a separate product brochure. They can be used in systems workstations or system sites, and to simplify routine in combination with the R&S®RAMON radiomonitoring tasks by translating them into fully automated software.
    [Show full text]
  • 2030 DF High-Resolution Direct Finding Equipment
    AIRCRAFT | NAVIGATION AND SURVEILLANCE SYSTEMS 2030 DF HIGH-RESOLUTION DIRECTION FINDING EQUIPMENT Moog Inc. is a worldwide designer, manufacturer and integrator of mission critical products and systems. Over the past 60 years, we have developed a reputation for delivering innovative solutions for the most challenging civil, military and marine applications. Moog’s product heritage in navigation and surveillance systems is based on supplying innovative system solutions to civil aviation authorities and military commands worldwide. By the 1980’s, we were supplying complete fixed base, shipboard, mobile and man portable TACAN systems to customers globally. 2030 DF OVERVIEW Moog’s 2030 Direction Finder (DF) offers reliability, flexibility and superior performance backed by many years of worldwide installation experience. A typical system is comprised of an antenna, receiving and resolving equipment, touch screen numerical vector display (NVD), frequency control equipment, front-end processor (FEP) and a signal distribution facility option. The high resolution 2030 DF provides accurate navigation information using standard VHF or UHF radio systems. The modular, versatile system design of the 2030 can be easily expanded as requirements change. Technical advantages include extensive BITE facilities, remote control operation with remote indication of fault parameters, remote testing and fault diagnosis. REMOTE MAINTENANCE MONITORING (RMM) The 2030 DF has an integrated monitoring and maintenance system which can be displayed on a local PC, remote PC or both. Display screens show operating parameters, overall system status, LRU status, alarm limits, diagnostics and test, amplifier status and transmitter control status. The 2030 DF features a BITE system which continually monitors and provides alarm indications in the event of module failure, system transfer or shutdown.
    [Show full text]
  • Attack on a Sigint Collector, the USS Liberty (8 CCO)
    TOP SECRET UNITED STATES CRYPTOLOGIC HISTORY Attack on a Sigint Collector, the U.S.S. Liberty (8 CCO) ~O'f ftELEASABLE 'fO t'OftEI8!.- NA'flONAL3 'fHIS f){)Et:Jt.IEN'f E6N'fAINS eot>EW6Kf> MA'fEKIAL Classified by NSA/CSSM 123-2 Review in April 2011 Declassified and approved for release by NSA on 11-08-2006 pursuant to E.O. 12958, as amended. MDR 51712. TOP SECRET Contents of this publication should not be reproduced, or further disseminated outside the U.S. Intelligence Community without the permission of the Director, NSA/CSS. Inquiries about reproduction and dissemination should be directed to the Office of Cryptologic Archives and History, T54. i 'fOP SECRE'f UMBRA I UNITED STATES CRYPTOLOGIC HISTORY Special Series Crisis Collection Volume 1 Attack on a Sigint Collector, the U.S.S. Liberty (S-CCO) William D. Gerhard Henry W. Millington NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1981 NO'f KELEASABLE 'fO FOKEIGN NA'flONALS 'fOP SHCRE'f UMBRA -- -- --- -~--------...................,...~ UNCLASSIFIED Contents Page Foreword----------------------------------------------------------------------------------- vii Authors' Note------------------------------------------------------------------------------- ix Chapter I POLITICAL-MILITARY BACKGROUND <V>---------------------------------------­ Chapter II CONSIDERATIONS LEADING TO THE SHIP'S DEPLOYMENT (U) ----------------­ 5 The Requirements for Intelligence (U) ----------------------------------------------------­ 5 Technical Collection Factors (U) ----------------------------------------------------------
    [Show full text]
  • Fm 2-22.3 (Fm 34-52)
    FM 2-22.3 (FM 34-52) HUMAN INTELLIGENCE COLLECTOR OPERATIONS HEADQUARTERS, DEPARTMENT OF THE ARMY September 2006 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and regulations. This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE ............................................................................................................... vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION...................................................................................................1-1 Intelligence Battlefield Operating System .............................................................1-1 Intelligence Process..............................................................................................1-1 Human Intelligence ...............................................................................................1-4 HUMINT Source....................................................................................................1-4 HUMINT Collection and
    [Show full text]
  • Select Committee on Intelligence United States
    SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE Additional Prehearing Questions for James R. Clapper, Jr. Upon his nomination to be Director of National Intelligence Responsibilities of the Director of National Intelligence 1. What is your understanding of the following responsibilities of the Director of National Intelligence (DNI)? a. As the head of the Intelligence Community (IC). b. As the principal adviser to the President, the National Security Council, and the Homeland Security Council for intelligence matters related to the national security. c. In overseeing and directing the implementation of the National Intelligence Program. d. In managing the Office of the Director of National Intelligence (ODNI). As head of the intelligence community, the DNI not only develops policies and procedures to guide the work of U.S. intelligence agencies, but also oversees their performance to ensure compliance with these policies and procedures. The DNI’s ultimate objective, pursuant to the Intelligence Reform and Terrorism Prevention Act, is to create a unified intelligence effort at the national level that is both effective and efficient. A significant part of this responsibility also includes representing the interests and positions of the intelligence community to the rest of the Executive branch, the Congress, foreign governments, and the public. As principal intelligence adviser to the President, the DNI ensures that the President and senior government officials receive the substantive intelligence support they require to carry out their responsibilities. This entails keeping them apprised of current, ongoing developments around the world; having intelligence analysis prepared to meet short-term needs, preparing longer-term assessments to support longer-term policy decisions; and responding to questions they have about intelligence they have received.
    [Show full text]
  • Doubles Troubles: the CIA and Double Agents During the Cold War
    International Journal of Intelligence and CounterIntelligence ISSN: 0885-0607 (Print) 1521-0561 (Online) Journal homepage: http://www.tandfonline.com/loi/ujic20 Doubles Troubles: The CIA and Double Agents during the Cold War Benjamin B. Fischer To cite this article: Benjamin B. Fischer (2016) Doubles Troubles: The CIA and Double Agents during the Cold War, International Journal of Intelligence and CounterIntelligence, 29:1, 48-74, DOI: 10.1080/08850607.2015.1083313 To link to this article: https://doi.org/10.1080/08850607.2015.1083313 Published online: 13 Nov 2015. Submit your article to this journal Article views: 1173 View Crossmark data Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=ujic20 International Journal of Intelligence and CounterIntelligence, 29: 48–74, 2016 Copyright # Taylor & Francis Group, LLC ISSN: 0885-0607 print=1521-0561 online DOI: 10.1080/08850607.2015.1083313 BENJAMIN B. FISCHER Doubles Troubles: The CIA and Double Agents during the Cold War FOOL ME ONCE OR FOOL ME MANY TIMES Double agents are a special breed of people. They pretend to spy for one foreign intelligence service while actually spying for another. All intelligence services fall victim to such deception from time to time. It’s all part of the ‘‘wilderness of mirrors’’ in spy wars where illusion and reality coexist and confound. Former Director of Central Intelligence (DCI) Richard Helms once told Congress that detecting a double-agent operation is ‘‘one of the most difficult and tricky aspects of intelligence work, and there isn’t anybody who’s been in it very long who hasn’t been tricked once, twice, maybe many times.’’1 Helms’s statement was prophetic, though he couldn’t have known it.
    [Show full text]