Signals Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

Signals Intelligence 29 April 1998 Thanks to Jeffrey T. Richelson and Ballinger The U.S. Intelligence Community Jeffrey T. Richelson New York, Ballinger, 1989 This excerpt from Second Edition (soft), pp. 167-197 Chapter 8 SIGNALS INTELLIGENCE Signals intelligence (SIGINT) is traditionally considered to be one of the most important and sensitive forms of intelligence. The interception of foreign signals can provide data on a nation's diplomatic, scientific, and economic plans or events as well as the characteristics of radars, spacecraft and weapons systems. SIGINT can be broken down into five components: • communications intelligence (COMINT) • electronics intelligence (ELINT) • radar intelligence (RADINT) • laser intelligence (LASINT) • non-imaging infrared. As its name indicates, COMINT is intelligence obtained by the interception, processing, and analysis of the communications of foreign governments or groups, excluding radio and television broadcasts. The communications may take a variety of forms--voice, Morse code, radio-teletype or facsimile. The communications may be encrypted, or transmitted in the clear. The targets of COMINT operations are varied. The most traditional COMINT target is diplomatic communications--the communications from each nation's capital to its diplomatic establishments around the world. The United States has intercepted and deciphered the diplomatic communications of a variety of nations-- Britain during the 1956 Suez Crisis, Libya's communications to its East Berlin People's Bureau prior to the bombing of a nightclub in West Berlin in 1985, Iraq's communications to its embassy in Japan in the 1970s. The United States also targets the communications between different components of a large number of governments. On some occasions both components are located within the country, on other occasions at least one is located outside national boundaries. Communications that may be targeted include those between government officials, different ministries, a ministry or agency and subordinate units throughout the country and abroad, 1 arms factories, military units during exercises and operations, and police and security forces and their headquarters. More specifically, the United States intercepts communications between the Soviet Ministry of Defense and Military District headquarters, and between Military District headquarters and units in the field; between transmitter stations and Soviet submarines; between the President of Egypt and his subordinates (including the time when Egypt was holding the hijackers of the Achille Lauro); and between military units at all levels in the Philippines. In 1980, U.S. intercepts of Soviet communications generated a fear that the Soviets were about to invade Iran. In 1983 intercepts allowed the United States to piece together the details concerning the sinking of a Soviet submarine in the North Pacific.1 At times, entire sets of targets may be dropped or have their coverage dramatically increased. In the early 1970s the United States dropped COMINT coverage of the Soviet civil defense network (coverage was later resumed). In 1983 it began an all-source intelligence program (that included COMINT) to improve intelligence on the Soviet prison camp system, with the specific intent of issuing a study that would embarrass the Soviets. The intelligence was intended to determine the location of the camps, existing conditions, and the number of political prisoners. Governmental communications do not exhaust the set of COMINT targets. The communications of political parties or guerilla movements may also be targeted. The communications of the African National Congress in South Africa, the El Salvadoran rebels, and the Greek Socialist Party are all likely targets of COMINT activities. In addition, the communications of terrorist groups can also be COMINT targets--both to permit understanding of how the group functions and the personalities of its leaders, and to allow prediction of where and how the groups will strike next. Another major set of COMINT targets are associated with economic activity (of both the legal and illegal variety)--for example, the communications of multinational corporations and narcotics traffickers. In 1970, the predecessor to the Drug Enforcement Administration informed the NSA that it had "a requirement for any and all COMINT information which reflects illicit traffic in narcotics and dangerous drugs." Specific areas of interest included organizations and individuals engaged in such activities, the distribution of narcotics, narcotic cultivation and production centers, efforts to control the traffic in narcotics, and all violations of U.S. Laws concerning narcotics and dangerous drugs.2 Electronic intercept operations are intended to produce electronic intelligence (ELINT) by intercepting the non-communication signals of military and civilian hardware, excluding those signals resulting from atomic detonations. Under NSA project KILTING, all ELINT signals are stored in computerized reference files containing the most up-to-date technical information about the signals. The earliest of ELINT targets were World War II air defense radar systems. The objective was to gather emanations that would allow the identification of the presence and operating characteristics of the radars--information that could be used to circumvent or neutralize the radars (through direct attack or electronic countermeasures) during bombing raids. Information desired included frequencies, signal strengths, pulse lengths and rates, and other specifications. Since that time, intelligence, space tracking, and ballistic missile early-warning radars have joined the list of ELINT targets. In the early 1950s the primary targets were Soviet Bloc (including PRC) radars. Soviet radars remain a prime ELINT target. Monitoring Soviet radars also has an arms control verification aspect, since the 1972 ABM Treaty restricts the use of radars in an "ABM mode." During the Vietnam war, North Vietnamese radars were also major targets. Libyan and Iranian radars are clearly prime targets in the late 1980s. 2 A subcategory of ELINT is Foreign Instrumentation Signals Intelligence (FISINT). Foreign instrumentation signals are electromagnetic emissions associated with the testing and operational deployment of aerospace, surface, and subsurface systems that have military or civilian applications. Such signals include, but are not limited to, signals from telemetry, beaconing, electronic interrogators, tracking-fusing-aiming/command systems, and video data links.3 A subcategory of FISINT is Telemetry Intelligence (TELINT). Telemetry is the set of signals by which a missile, missile stage, or missile warhead sends, back to earth, data about its performance during a test flight. The data relate to structural stress, rocket motor thrust, fuel consumption, guidance system performance, and the physical conditions of the ambient environment. Intercepted telemetry can provide data to estimate the number of warheads carried by a given missile, its payload and throw-weight, the probable size of its warheads, and the accuracy with which the warheads are guided at the point of release from the missile's post-boost vehicles.4 Radar intelligence--the intelligence obtained from the use of non-imaging radar--is similar to ELINT in that no intercepted communications are involved. However, RADINT does not depend on the interception of another object's electronic emanations. It is the radar which emanates electronic signals--radio waves--and the deflection of those signals allows for intelligence to be derived. Information that can be obtained from RADINT includes flight paths, velocity, maneuvering, trajectory, and angle of descent. Two further categories of SIGINT were listed in the proposed National Security Agency charter of 1980--information derived from the collection and processing of (I) non-imaging infrared, and (2) coherent light signals. The former involves sensors that can detect the absence/presence and movement of an object via temperature. The term "coherent light signal" refers to lasers, and hence this category includes the interception of laser communications, as well as the emissions from Soviet laser research and development activities.5 The ease with which signals (whether communications or electronic signals) can be intercepted and understood depends on three factors: the method of transmission, the frequencies employed, and the encipherment system (or lack of) used to conceal the signals meaning form unauthorized personnel. The most secure form of transmission is that sent by cables, either land lines or underwater cables. Communications or other signals transmitted through such cables cannot be snatched out of the air. Interception of cable traffic has involved physically tapping into the cables or using "induction" devices that are placed in the proximity of the cables and maintenance of equipment at the point of access. This might be unobtainable with respect to hardened and protected internal landlines, the type of landline that carries much high-priority, secret command and control communications. Undersea cables are most vulnerable since the messages transmitted by them are then transmitted by microwave relay once the cable reaches land. A tremendous volume of communications is sent via satellite systems. Domestic and international telephone messages, and military and business communications are among those regularly transmitted via satellite using ultra, very, super, and extremely high frequencies (UHF, VHF, SHF
Recommended publications
  • Review: KE007 a Conspiracy of Circumstance, by Murray Sayle
    Review: KE007 A Conspiracy of Circumstance, By Murray Sayle The New York Review of Books // April 25, 1985 Black Box: KAL 007 and the Superpowers, by Alexander Dallin // University of California Press, 130 pp., $7.95 (paper) KAL Flight 007: The Hidden Story, by Oliver Clubb // Permanent Press, 174 pp., $16.95 Final Report of Investigation as Required in the Council Resolution of September 16, 1983 [C-WP/7764] International Civil Aviation Organization (Montreal), 113, restricted, but available on serious request pp. 1818th Report to Council by the President of the Air Navigation Commission [C-WP/7809] International Civil Aviation Organization (Montreal), 23, restricted, but available on serious request pp. North Atlantic Airspace Operations Manual-Fourth Edition Civil Aviation Authority (London), 32, available on request pp. NOPAC Route Systems Operations Handbook Administration Anchorage Air Route Traffic Control Center, Federal Aviation, 16, available on request pp. 1. Shortly before dawn on September 1, 1983, a Boeing 747 Flight KE007 of Korean Air Lines was shot down over Sakhalin Island in the Soviet Far East by an SU-15 fighter of the Soviet Air Force, with the loss of all 269 passengers and crew on board. The incident set off a contest in vituperation between the super-powers, which, a year and a half later, still reverberates. President Reagan called the shoot-down "a terrorist act to sacrifice the lives of innocent human beings," while the Soviets have never ceased charging that the aircraft was engaged on a "special mission" of electronic espionage on behalf of the United States, thus by implication justifying what they call their "termination" of the flight.
    [Show full text]
  • Electronic Security Squadron
    6915th ELECTRONIC SECURITY SQUADRON USAFSS turned over Hof Air Station, Germany, to the United States Air Forces in Europe (USAFE) and inactivated the 6915 SS. 1971 6915th Hof , West Germany (Closed 1971) 6915th ESS Bad Aibling, Ger. 1 Aug '79-30 Sept '93 LINEAGE STATIONS Bad Aibling Station, West Germany ASSIGNMENTS COMMANDERS LTC Arthur R. Marshall HONORS Service Streamers Campaign Streamers Armed Forces Expeditionary Streamers Decorations EMBLEM EMBLEM SIGNIFICANCE MOTTO NICKNAME OPERATIONS The 6915th Electronic Security Squadron is located at Bad Aibling Station, West Germany, in the heart of Bavaria, 35 miles southeast of Munich. The 6915th is a tenant unit, as Bad Aibling Station is "owned" by the Department of Defense. All facets of life on station are joint service. The 6915th enjoys a good relationship with the other services, both on the job and in the community. The mission is a challenging one with electronic equipment that is on the leading edge of technology. All work spaces are new or recently renovated and there are several new facility upgrades projected over the next years. In any workplace except the orderly room, a member's supervisor and coworkers could be Army, Navy, Air Force or civilian, making for a unique and interesting work environment. Although Bad Aibling Station is a small community, 6915th members enjoy a wide range of off duty activities. BAS has the full compliment of sports and leisure facilities with skiing, sight seeing, local German fests and many other outdoor activities offered off-station most of the year. In September 1987, the 6915th hosted their first Air Force Dining-Out.
    [Show full text]
  • A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
    Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B.
    [Show full text]
  • Jim's 1985 Book Reviews Debunk the Conspiracies
    An abridged version of the following review appeared in ‘The American Spectator’, October 1985, pp 36-39. The second review is from ’National Review’ magazine, March 27, 1987. Sense, Nonsense, and Pretense on the Korean Airliner Atrocitv -- A Reader's Guide to the Literature, by James E. Oberg // date: July 31, 1985 "Reassessing the Sakhalin incident“, P. Q. Mann (pseudonym). Defence Attache, No. 3. (May-June) 1984, pp 41-56. "K.A.L. 007: What the U.S. Knew and When We Knew It", David Pearson. The Nation, Aug 18-25, 1984, pp 105-124. "Sakhalin Sense and Nonsense", J. E. Oberg, Defence Attache, No. 1 (Jan-Feb) 1985. pp 37-47. KAL FLIGHT 007: The Hidden Story, by Oliver Clubb, Permanent Press, Sag Harbor, New York, April 1965, 174 pages, $16.95. Black Box: KAL 007 and the Superpowers. by Alexander Dallin. University of California Press, Berkeley. California. 1985, 130 pages, $14.95. Day of the Cobra The True Story of KAL Flight 007, by Jeffrey St. John, Thomas Nelson Publishers, Nashville, Tennessee, 1984, 254 pages, $11.95. Massacre 747: The Story of Korean Airlines Flight 007, by Richard Rohmer, Paperjacks Ltd., Markham, Ontario. May 1964, 213 pages paperback, $3.95. The Curious Flight, of KAL 007, by Conn Hallinan, U. S. Peace Council, New York, NY, 1984, 6 pages. The President's Crime: The Provocation with the South Korean Airliner Carried Out by Order of Reagan, by "Akio Takahashi", Novosti Publishers,Moscow, 1984, 126 pages, 30 kopecks. "KE007 -- A Conspiracy of Circumstance", Murray Sayle, The New York Review of Books, April 25, 1965, pages 44-54.
    [Show full text]
  • History, It Is Checkered
    Historical Notes ----------------------------------------------------------------------------------------------------------- Date: Mon, 3 Nov 1997 23:30:10 +0500 From: "Chuck Rippel" <crippel@...> Subject: [R-390] BA Receiver Fun - Targets Thanks for the many notes I received about posting some targets for our BA receivers. I was astounded at the number of affirmative replies received. As many know, I find listening a great deal of fun and very challenging. There are basically two styles of listening. Short Wave Listening is where the operator tunes in to a particular program. Short Wave Broadcast DX'ing is listening for very weak or seasonally challenging radio broadcasts or stations. In most cases, the language used by the broadcaster is not english as they are serving the local population. It is DX'ing v/s Listening where I intend to focus. Being a good SWBC DX'er is a bit like being a good detective. Various clues are pieced together to arrive at a conclusion. In our case, identifying an unknown station. Some of those clues are: Time Frequency Language Programming Music Style Time: Audibility of a station depends on the time it is broadcasting and the frequency it is on. Typically, the frequencies over 10 mhz are best during local day light and below, local dark. Signals below 7 mhz generally require darkness between the transmitter and receiver locations. However, not always and we will explore the opportunities when that rule can be expanded a bit. Frequency: Armed with the time and knowledge of propagation, frequency is the next big clue. There is general frequency consideration or band consideration. An example might be if a station on 4915 were being heard at 2200UTC on the East Coast.
    [Show full text]
  • Thirteen Nations on Mount Everest John Cleare 9
    Thirteen nations on Mount Everest John Cleare In Nepal the 1971 pre-monsoon season was notable perhaps for two things, first for the worst weather for some seventy years, and second for the failure of an attempt to realise a long-cherished dream-a Cordee internationale on the top of the world. But was it a complete failure? That the much publicised International Himalayan Expedition failed in its climbing objectives is fact, but despite the ill-informed pronouncements of the headline devouring sceptics, safe in their arm-chairs, those of us who were actually members of the expedition have no doubt that internationally we did not fail. The project has a long history, and my first knowledge of it was on a wet winter's night in 1967 at Rusty Baillie's tiny cottage in the Highlands when John Amatt explained to me the preliminary plans for an international expedi­ tion. This was initially an Anglo-American-Norwegian effort, but as time went by other climbers came and went and various objectives were considered and rejected. Things started to crystallise when Jimmy Roberts was invited to lead the still-embryo expedition, and it was finally decided that the target should be the great South-west face of Mount Everest. However, unaware of this scheme, Norman Dyhrenfurth, leader of the successful American Everest expedition of 1963-film-maker and veteran Himalayan climber-was also planning an international expedition, and he had actually applied for per­ mission to attempt the South-west face in November 1967, some time before the final target of the other party had even been decided.
    [Show full text]
  • Historical Dictionary of Air Intelligence
    Historical Dictionaries of Intelligence and Counterintelligence Jon Woronoff, Series Editor 1. British Intelligence, by Nigel West, 2005. 2. United States Intelligence, by Michael A. Turner, 2006. 3. Israeli Intelligence, by Ephraim Kahana, 2006. 4. International Intelligence, by Nigel West, 2006. 5. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. 6. Cold War Counterintelligence, by Nigel West, 2007. 7. World War II Intelligence, by Nigel West, 2008. 8. Sexspionage, by Nigel West, 2009. 9. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Historical Dictionary of Air Intelligence Glenmore S. Trenear-Harvey Historical Dictionaries of Intelligence and Counterintelligence, No. 9 The Scarecrow Press, Inc. Lanham, Maryland • Toronto • Plymouth, UK 2009 SCARECROW PRESS, INC. Published in the United States of America by Scarecrow Press, Inc. A wholly owned subsidiary of The Rowman & Littlefield Publishing Group, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 www.scarecrowpress.com Estover Road Plymouth PL6 7PY United Kingdom Copyright © 2009 by Glenmore S. Trenear-Harvey All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the publisher. British Library Cataloguing in Publication Information Available Library of Congress Cataloging-in-Publication Data Trenear-Harvey, Glenmore S., 1940– Historical dictionary of air intelligence / Glenmore S. Trenear-Harvey. p. cm. — (Historical dictionaries of intelligence and counterintelligence ; no. 9) Includes bibliographical references. ISBN-13: 978-0-8108-5982-1 (cloth : alk. paper) ISBN-10: 0-8108-5982-3 (cloth : alk. paper) ISBN-13: 978-0-8108-6294-4 (eBook) ISBN-10: 0-8108-6294-8 (eBook) 1.
    [Show full text]
  • International Default Location Field the Country Column Displays The
    Country Descr Country Descr AUS CAIRNS BEL KLEINE BROGEL AUS CANBERRA BEL LIEGE AUS DARWIN, NORTHERN BEL MONS TERRITOR Belgium BEL SHAPE/CHIEVRES AUS FREMANTLE International Default Location Field BEL ZAVENTEM AUS HOBART Australia BEL [OTHER] AUS MELBOURNE The Country column displays the most BLZ BELIZE CITY AUS PERTH commonly used name in the United States of BLZ BELMOPAN AUS RICHMOND, NSW Belize America for another country. The Description BLZ SAN PEDRO AUS SYDNEY column displays the Default Locations for Travel BLZ [OTHER] AUS WOOMERA AS Authorizations. BEN COTONOU AUS [OTHER] Benin BEN [OTHER] AUT GRAZ Country Descr Bermuda BMU BERMUDA AUT INNSBRUCK AFG KABUL (NON-US FACILITIES, Bhutan BTN BHUTAN AUT LINZ AFG KABUL Austria BOL COCHABAMBA AUT SALZBURG AFG MILITARY BASES IN KABUL BOL LA PAZ AUT VIENNA Afghanistan AFG MILITARY BASES NOT IN BOL SANTA CRUZ KABU AUT [OTHER] Bolivia BOL SUCRE AFG [OTHER] (NON-US FACILITIES AZE BAKU Azerbaijan BOL TARIJA AFG [OTHER] AZE [OTHER] BOL [OTHER] ALB TIRANA BHS ANDROS ISLAND (AUTEC & Albania OPB BIH MIL BASES IN SARAJEVO ALB [OTHER] BHS ANDROS ISLAND Bosnia and BIH MIL BASES NOT IN SARAJEVO DZA ALGIERS Herzegovina Algeria BHS ELEUTHERA ISLAND BIH SARAJEVO DZA [OTHER] BHS GRAND BAHAMA ISLAND BIH [OTHER] American Samoa ASM AMERICAN SAMOA BHS GREAT EXUMA ISL - OPBAT BWA FRANCISTOWN Andorra AND ANDORRA Bahamas SI BWA GABORONE AGO LUANDA BHS GREAT INAGUA ISL - OPBAT Angola Botswana BWA KASANE AGO [OTHER] S BWA SELEBI PHIKWE ATA ANTARCTICA REGION POSTS BHS NASSAU BWA [OTHER] Antarctica ATA MCMURDO STATION
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • Volume I Return to an Address of the Honourable the House of Commons Dated 15 June 2010 for The
    Report of the Return to an Address of the Honourable the House of Commons dated 15 June 2010 for the Report of the Bloody Sunday Inquiry The Rt Hon The Lord Saville of Newdigate (Chairman) Bloody Sunday Inquiry – Volume I Bloody Sunday Inquiry – Volume The Hon William Hoyt OC The Hon John Toohey AC Volume I Outline Table of Contents General Introduction Glossary Principal Conclusions and Overall Assessment Published by TSO (The Stationery Office) and available from: Online The Background to Bloody www.tsoshop.co.uk Mail, Telephone, Fax & E-mail Sunday TSO PO Box 29, Norwich NR3 1GN Telephone orders/General enquiries: 0870 600 5522 Order through the Parliamentary Hotline Lo-Call: 0845 7 023474 Fax orders: 0870 600 5533 E-mail: [email protected] Textphone: 0870 240 3701 The Parliamentary Bookshop 12 Bridge Street, Parliament Square, London SW1A 2JX This volume is accompanied by a DVD containing the full Telephone orders/General enquiries: 020 7219 3890 Fax orders: 020 7219 3866 text of the report Email: [email protected] Internet: www.bookshop.parliament.uk TSO@Blackwell and other Accredited Agents Customers can also order publications from £572.00 TSO Ireland 10 volumes 16 Arthur Street, Belfast BT1 4GD not sold Telephone: 028 9023 8451 Fax: 028 9023 5401 HC29-I separately Return to an Address of the Honourable the House of Commons dated 15 June 2010 for the Report of the Bloody Sunday Inquiry The Rt Hon The Lord Saville of Newdigate (Chairman) The Hon William Hoyt OC The Hon John Toohey AC Ordered by the House of Commons
    [Show full text]
  • From U.S. Army Installation to Zero Energy Community: the B&O Bad
    © 2014 ASHRAE (www.ashrae.org). Published in ASHRAE Transactions, Volume 120, Part 1. For personal use only. Additional reproduction, distribution, or transmission in either print or digital form is not permitted without ASHRAE's prior written permission. NY-14-016 From U.S. Army Installation to Zero Energy Community: The B&O Bad Aibling Park Looks to the Future Alfred Kerschberger, PhD Ernst Boehm, PhD ABSTRACT personnel and their families lived and worked at the base. Typ- ical for an American base, the park-like site was largely self- The B&O Bad Aibling Park, located in Bavaria, sufficient. An oil-fired district heating station supplied the Germany, occupies a 173-acre (70 ha) facility that originally buildings at the site with 66,536 MBtu/h (19.5 MW) of heat. served as an airbase.Although the site buildings were in good After the end of the Cold War and the shift in eastern/western repair, their thermal quality was poor. The district heating bloc borders, the base lost its importance, and in 2004 it was system was in good condition, but the scale of heat generation returned to the Federal Republic of Germany. In 2006, the was too large. This project described in this paper designed B&O real estate management and construction company a development plan that could be easily replicated and that acquired the grounds for high-quality development. could ultimately become a model for a zero energy city. The B&O Bad Aibling Park project employed a rich diversity of When the Bad Aibling Station was taken over from technologies that may be scaled up for application in larger the American Army, its 52 building complexes contained urban areas.
    [Show full text]
  • Development of Surveillance Technology and Risk of Abuse of Economic Information
    ∋(9(/230(172)6859(,//∃1&( 7(&+12/2∗<∃1∋5,6.2)∃%86( 2)(&2120,&,1)250∃7,21 9ΡΟ 7ΚΗςΗΡΙΚΗΥΛΘΦΡΠΠΞΘΛΦΛΡΘς ,ΘΗΟΟΛϑΗΘΦΗ&20,17ΡΙΞΡΠ∆ΗΓΣΥΡΦΗςςΛΘϑΙΡΥΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗς ΡΙΛΘΗΥΦΗΣΗΓΕΥΡΓΕΘΓΠΞΟΛΟΘϑΞϑΗΟΗςΗΓΡΥΦΡΠΠΡΘΦΥΥΛΗΥ ς∴ςΗΠςΘΓΛςΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘ ΛΘΦΟΞΓΛΘϑςΣΗΗΦΚΥΗΦΡϑΘΛΛΡΘ :ΡΥΝΛΘϑΓΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ /Ξ[ΗΠΕΡΞΥϑ2ΦΡΕΗΥ 3(9ΡΟ &ΟΡϑΞΛΘϑΓ 7ΛΟΗ 3∆Υ7ΚΗςΗΡΙΚΗΥΛΘΦΡΠΠΞΘΛΦΛΡΘς ,ΘΗΟΟΛϑΗΘΦΗ&20,17ΡΙΞΡΠ∆ΗΓΣΥΡΦΗςςΛΘϑΙΡΥ ΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗςΡΙΛΘΗΥΦΗΣΗΓΕΥΡΓΕΘΓΞΟΛ ΟΘϑΞϑΗΟΗςΗΓΡΥΦΡΠΠΡΘΦΥΥΛΗΥς∴ςΗΠςΘΓΛς ΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘ ΛΘΦΟΞΓΛΘϑςΣΗΗΦΚΥΗΦΡϑΘΛΛΡΘ :ΡΥΝΣΟΘ5ΗΙ (3,9%672∃ 3ΞΕΟΛςΚΗΥ (ΞΥΡΣΗΘ3ΥΟΛΠΗΘ ∋ΛΥΗΦΡΥΗ∗ΗΘΗΥΟΙΡΥ5ΗςΗΥΦΚ ∋ΛΥΗΦΡΥΗ∃ 7ΚΗ672∃3ΥΡϑΥ∆ΠΠΗ ∃ΞΚΡΥ ∋ΞΘΦΘ&ΠΣΕΗΟΟ,379/ΩΓ(ΓΛΘΕΞΥϑΚ (ΓΛΡΥ 0Υ∋ΛΦΝ+2/∋6:257+ +ΗΓΡΙ672∃8ΘΛ ∋Η 2ΦΡΕΗΥ 3(ΘΞΠΕΗΥ 3(9ΡΟ 7ΚΛςΓΡΦΞΠΗΘΛςΖΡΥΝΛΘϑ∋ΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ,ΛςΘΡΘΡΙΙΛΦΛΟΣΞΕΟΛΦΛΡΘΡΙ672∃ 7ΚΛςΓΡΦΞΠΗΘΓΡΗςΘΡΘΗΦΗςςΥΛΟ∴ΥΗΣΥΗςΗΘΚΗΨΛΗΖςΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ I nterception Capabilities 2000 Report to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information. This study considers the state of the art in Communications intelligence (Comint) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to Comint targeting and selection, including speech recognition. I nterception Capabilities 2000 Cont ent s SUMMARY .............................................................................................................................................................................................
    [Show full text]