Amazines Free Article Archive
www.amazines.com - Monday, December 23, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133574)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73858)
 Automotive (145718)
 Blogs (75618)
 Boating (9851)
 Books (17224)
 Buddhism (4130)
 Business (1330878)
 Business News (426454)
 Business Opportunities (366524)
 Camping (10973)
 Career (72795)
 Christianity (15852)
 Collecting (11638)
 Communication (115089)
 Computers (241958)
 Construction (38967)
 Consumer (49954)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20322)
 Dating (45910)
 EBooks (19703)
 E-Commerce (48272)
 Education (185530)
 Electronics (83525)
 Email (6438)
 Entertainment (159862)
 Environment (28995)
 Ezine (3040)
 Ezine Publishing (5454)
 Ezine Sites (1551)
 Family & Parenting (111009)
 Fashion & Cosmetics (196613)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310622)
 Fitness (106492)
 Food & Beverages (63057)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630169)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91743)
 Home Improvement (251239)
 Home Repair (46252)
 Humor (4727)
 Import - Export (5460)
 Insurance (45104)
 Interior Design (29619)
 International Property (3488)
 Internet (191027)
 Internet Marketing (146690)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80500)
 Link Popularity (4596)
 Manufacturing (20927)
 Marketing (99325)
 MLM (14140)
 Motivation (18236)
 Music (27000)
 New to the Internet (9498)
 Non-Profit Organizations (4048)
 Online Shopping (129741)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12691)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126830)
 Recreation & Leisure (95495)
 Relationships (87677)
 Research (16182)
 Sales (80357)
 Science & Technology (110298)
 Search Engines (23521)
 Self Improvement (153317)
 Seniors (6222)
 Sexuality (36012)
 Small Business (49336)
 Software (83053)
 Spiritual (23535)
 Sports (116155)
 Tax (7664)
 Telecommuting (34070)
 Travel & Tourism (308286)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11794)
 Website Design (56938)
 Website Promotion (36665)
 World News (1000+)
 Writing (35845)
Author Spotlight
VINCENT BOSSLEY

Vincent Bossley is a publisher and sailor living on the Northern Beaches of Sydney Australia. He has...more
SHOEB SIDDIQUE

From the time of study, i had a keen interest in acquiring knowledge by surfing on the Internet. Mea...more
RODRIGO DARZI

Pai da Júlia e do Pedro. Especialista em Marketing Digital, com MBA em e-Business pela FGV. Formado ...more
DAVID PAYNE

Technology without a doubt has made things easier for us. However, that being said, it has also comp...more
K HO

Affiliate marketer - I enjoy the challenge of what the internet has to offer. It has given me the o...more


Radiofrequency MASINT by big tree





Article Author Biography
Radiofrequency MASINT by
Article Posted: 07/21/2010
Article Views: 87
Articles Written: 1033
Word Count: 1858
Article Votes: 0
AddThis Social Bookmark Button

Radiofrequency MASINT


 
Business,Business News,Business Opportunities
Disciplines
MASINT is made up of six major disciplines, but the disciplines overlap and intertwine. They interact with the more traditional intelligence disciplines of HUMINT, IMINT, and SIGINT. To be more confusing, while MASINT is highly technical and is called such, TECHINT is another discipline, dealing with such things as the analysis of captured equipment.
An example of the interaction is "imagery-defined MASINT (IDM)". In IDM, a MASINT application would measure the image, pixel by pixel, and try to identify the physical materials, or types of energy, that are responsible for pixels or groups of pixels: signatures. When the signatures are then correlated to precise geography, or details of an object, the combined information becomes something greater than the whole of its IMINT and MASINT parts.
The Center for MASINT Studies and Research breaks MASINT into:
Electro-optical MASINT
Nuclear MASINT
Geophysical MASINT
Radar MASINT
Materials MASINT
Where COMINT and ELINT, the two major components of SIGINT, focus on the intentionally transmitted part of the signal, radiofrequency MASINT focuses on unintentionally transmitted information. For example, a given radar antenna will have sidelobes emanating from other than the direction in which the main antenna is aimed. The RADINT (radar intelligence) MASINT subdiscipline involves learning to recognize a radar both by its primary signal, captured by ELINT, and its sidelobes, perhaps captured by the main ELINT sensor, or, more likely, a sensor aimed at the sides of the radio antenna.
MASINT associated with COMINT might involve the detection of common background sounds expected with human voice communications. For example, if a given radio signal comes from a radio used in a tank, if the interceptor does not hear engine noise or higher voice frequency than the voice modulation usually uses, even thought the voice conversation is meaningful, MASINT might suggest it is a deception, not coming from a real tank.
Frequency Domain MASINT
Different from emitter location in SIGINT, frequency analysis MASINT concentrates not on finding a specific device, but on characterizing the signatures of a class of devices, based on their intentional and unintentional radio emissions. Devices being characterized could include radars, communication radios, radio signals from foreign remote sensors, radio frequency weapons (RFW), collateral signals from other weapons, weapon precursors, or weapon simulators (for example, electromagnetic pulse signals associated with nuclear bursts); and spurious or unintentional signals.
See HF/DF for a discussion of SIGINT-captured information with a MASINT flavor, such as determining the frequency to which a receiver is tuned, from detecting the frequency of the beat frequency oscillator of the superheterodyne receiver. This may also be considered unintentional RF radiation (RINT). The local oscillator intercept technique, Operation RAFTER was first made public by a book by a retired senior officer in Britain's counterintelligence service, MI5. The book also discusses acoustic methods of capturing COMINT.
Electromagnetic Pulse MASINT
Nuclear and large conventional explosions produce radio frequency energy. The characteristics of the EMP will vary with altitude and burst size. EMP-like effects are not always from open-air or space explosions; there has been work with controlled explosions for generating electrical pulse to drive lasers and railguns.
For example, in a program called BURNING LIGHT, KC-135R tankers, temporarily modified to carry MASINT sensors, would fly around the test area, as part of Operation BURNING LIGHT. One sensor system measured the electromagnetic pulse of the detonation..
While EMP often is assumed to be a characteristic of nuclear weapons alone, such is not the case. Several open-literature techniques, requiring only conventional explosives, or, in the case of high power microwave, a large electrical power supply, perhaps one-shot as with capacitors, can generate a significant EMP:
Explosively pumped flux compression generators (FCG)
Explosive and Propellant Driven MHD Generators
High Power Microwave Sources - Spark gaps or the Vircator
EMP intelligence deals both offensive capability to build, generate particular power vs. frequency spectra, and means of optimizing coupling or other power delivery, and defensive EMP considerations of vulnerability.
Vulnerability has two components:
Coupling modes possible between the EMP source and the equipment
Front door coupling goes through an antenna intended to receive power in the frequency range being generated
Back door coupling in which the EMP produces surges in power (including ground) and communications wire.
The level of energy coupled that will damage or destroy a particular target.
Another aspect of offensive EMP intelligence is to evaluate the ways in which an EMP weapon could improve coupling. One approach involves the device extruding antennas. Another, similar to other precision guided munitions, is to bring the device as close as possible to the target.
Intelligence about EMP defense would consider the deliberate use of shielding (e.g., Faraday cages) or greater use of optical cabling.
Unintentional Radiation MASINT
The integration and specialized application of MASINT techniques against unintentional radiation sources (RINT) that are incidental to the RF propagation and operating characteristics of military and civil engines, power sources, weapons systems, electronic systems, machinery, equipment, or instruments. These techniques may be valuable in detecting, tracking, and monitoring a variety of activities of interest.(FM2-0Ch9)
Black Crow: truck detection on the Ho Chi Minh trail
A Vietnam-era "Black Crow" RINT sensor, carried aboard AC-130 gunships, detected the "static" produced by the ignition system of trucks on the Ho Chi Minh trail, from distances up to 10 miles, and cue weapons onto the truck.
Monitoring potentially necessary electronic emissions
Yet another technique that could determine the frequency to which a receiver is tuned was the technique of Operation RAFTER, which listened for the direct or additive frequency of the local oscillator in a superheterodyne receiver.
This technique can be countered by shielding the intermediate frequency circuitry of superheterodyne receivers, or moving into software-defined radio using digital signal processors with no local oscillator.
Unintentional radiation from electronic devices
This discipline blurs into the various techniques for collecting COMINT from unintentional radiation, both electromagnetic and acoustic, from electronic devices. TEMPEST is an unclassified US code word for the set of techniques for securing equipment from eavesdropping on Van Eck radiation and other emanations.
One of the blurry areas, for example, is understanding the normal incidental radiation from something as basic as a television set. The signals of a consumer product such as that are sufficiently complex that it may be practical to hide a covert eavesdropping channel within it.
Covert modulators for audio surveillance
Another category, to which the US code name TEAPOT may apply, is the detection not simply of RF, but of an unintended audio modulation of an external RF signal flooding the area being surveilled. Some object within the room acoustically couples to sound in the room, and acts as a modulator. The group doing the covert surveillance examines the reflected RF for amplitude modulation at the original frequency, or across a spectral band for frequency modulation
For example, in 1952, the Soviets presented the US Moscow embassy with a beautiful Great Seal of the United States. The Seal, however, had an acoustic diaphragm, forming a side of a resonant cavity which, when illuminated with a microwave beam, reflected the beam back as a signal that was modulated by the audio of conversations in the room. The conversations caused the dimensions of the resonant cavity to change, producing the modulated signal, This was a Passive Resonant Cavity Bug.
This effect may not require a purpose-built modulator. Items as mundane as an incandescent light bulb may act as modulators.
TEAPOT, assuming that is the code name, has similarities to the technique of using the reflections of a laser from a window. In that technique, the window vibrates from acoustic pressure on the inside, and modulates the laser carrier.
Secure signal leakage into ground
As early as the First World War, it was possible to intercept the information content of a telegraph or telephone using electrically unbalanced signals, by detecting signals of greater amplitude than the expected electrical ground. In an unbalanced transmission, the ground serves as a signal reference.
Covert modulation for digital surveillance
In the 1950s, it was found that there could be electrical coupling between the unencrypted side of a "RED" signal inside a secure communications facility, and either the conductor carrying the "BLACK" encrypted signal, or possibly the electrical ground(s) of the system. TEMPEST protective measures work against the situation when the frequency of the RED and BLACK signals are the same. The RED signal, at a low power level, may be intercepted directly, or there may be intermodulation between the RED and BLACK signals.
HIJACK is a more advanced threat, where the RED signal modulates a RF signal generated within the secure area, such as a cellular telephone. While HIJACK targets RF, NONSTOP targets the pulses of a digital device, typically a computer.
References
^ Interagency OPSEC Support Staff (IOSS) (May 1996). "Operations Security Intelligence Threat Handbook: Section 2, Intelligence Collection Activities and Disciplines". http://www.fas.org/irp/nsa/ioss/threat96/part03.htm. Retrieved 2007-10-03. 
^ Center for MASINT Studies and Research. "Center for MASINT Studies and Research". Air Force Institute of Technology. http://www.afit.edu/cmsr/. Retrieved 2007-10-03. 
^ Center for MASINT Studies and Research. "Center for MASINT Studies and Research". Air Force Institute of Technology. http://www.afit.edu/cmsr/. Retrieved 2007-10-03. 
^ US Army (May 2004). "Chapter 9: Measurement and Signals Intelligence". Field Manual 2-0, Intelligence. Department of the Army. https://atiam.train.army.mil/soldierPortal/atia/adlsc/view/public/10536-1/FM/2-0/chap9.htm. Retrieved 2007-10-03. 
^ Wright, Peter; Paul Greengrass (1987). Spycatcher: The Candid Autobiography of a Senior Intelligence Officer. Penguin Viking. Wright 1997. ISBN 0-670-82055-5. 
^ Strategic Air Command. "SAC Reconnaissance History January 1968-June 1971" (PDF). http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB184/FR28.pdf. Retrieved 2007-10-12. 
^ Kopp, Carlo (1996). "The Electromagnetic Bomb - a Weapon of Electrical Mass Destruction". Globalsecurity.org. http://www.globalsecurity.org/military/library/report/1996/apjemp.htm. Retrieved 2007-10-15. 
^ Correll, John T. (November 2004). "Igloo White" ([dead link] Scholar search). Air Force Magazine Online 87 (11). IglooWhite. http://www.afa.org/magazine/Nov2004/1104igloo.asp. Retrieved 2007-10-03. 
^ Atkinson, James M. (2002). "Video Signal Eavesdropping Threat Tutorial". http://www.tscm.com/TSCM101video3.html. Retrieved 2007-10-16. 
^ Atkinson, James M. (2002). "Spectral Analysis of Various RF Bugging Devices". http://www.tscm.com/spectan.html. Retrieved 2007-10-16. 
^ a b c Tempest Timeline, 23 January 2002, http://cryptome.org/tempest-time.htm 
v  d  e
Intelligence cycle management
Intelligence
collection
management
HUMINT/
Human Intelligence
Clandestine HUMINT (recruiting  operational techniques  Covert action  Direct action  Clandestine cell system)
Special reconnaissance (organizations)
Espionage (Agent handling  Black bag operation  Concealment device  Cryptography  Cut-out  Dead drop  Eavesdropping  False flag operations  Honeypot  Non-official cover  Interrogation  Numbers messaging  One-way voice link  Steganography  Surveillance)
SIGINT/
Signals Intelligence
SIGINT by Alliances, Nations and Industries  SIGINT Operational Platforms by Nation  SIGINT in Modern History  TEMPEST  Direction finding  Traffic analysis
MASINT/
Measurement and
Signature Intelligence
Electro-optical  Nuclear  Geophysical  Radar  Radiofrequency  Materials  Casualty estimation
Others
OSINT/Open Source Intelligence  IMINT/Imagery Intelligence  GEOINT/Geospatial Intelligence  FININT/Financial Intelligence  TECHINT/Technical intelligence
Intelligence
analysis
management
Intelligence analysis  Cognitive traps for intelligence analysis  Words of Estimative Probability  Analysis of Competing Hypotheses  Intelligence cycle (target-centric approach)
Intelligence
dissemination
management
Intelligence cycle security  Counter-intelligence  Counter-intelligence and counter-terrorism organizations  List of counterintelligence organizations  Counterintelligence failures
Categories: Applications of cryptography

Military intelligence

Intelligence gathering disciplines

Intelligence (information gathering)Hidden categories: All articles with dead external links

Articles with dead external links from April 2009

I am an expert from China Manufacturers, usually analyzes all kind of industries situation, such as laser tape measures , logic probe.

Related Articles - laser tape measures, logic probe,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
DONNIE LEWIS

I'm an avid consumer of a smoothie a day living, herbs, vitamins and daily dose of exercise. I'm 60...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
STEVE BURGESS

Steve Burgess is a freelance technology writer, a practicing computer forensics specialist as the pr...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license