telecommunications signals;
it
may
also
be
obtained
by
intercepting
a. Interception of electronic signals.
Examples are the interception
of telephone or radio conversations.
Such action is handled by
b. Interception of electromagnetic signals. Such signals are non-data
related radiations. Radar signals are an example. Action relating to such
interception is called Electronic Intelligence (ELINT).
5.
Signal Security (SIGSEC).
This is an overall term referring to
Such measures are taken to deny enemy
collection of data from COMINT and ELINT operations.
By listening to our
electronic emissions, the enemy gains information. This data relates to our
dispositions, operations, etc.
Such data can be fed directly into the
collection system for their intelligence use.
Also, they gain data about
our electronic systems. They then use it in planning actions to reduce our
combat effectiveness. They can accomplish their plans by interfering with
those systems.
6.
Compromising Emanations.
Data may also be obtained by the enemy
through compromising emanations.
These are unintentional and may be data
related or intelligence-bearing impulses. These impulses may be electrical,
magnetic, or acoustical. They are emitted by or come from any electrically
run, data-processing equipment or facility.
Such impulses relate to the
preparation, transmission, receipt, storage or retrieval of classified data.
Examples are electric typewriters and crypto equipment.
Automatic data
processing equipment is another example.
Control of these emanations
(TEMPEST) is a further counter to the SIGINT threat.
7.
Imagery Threat.
infrared, and photographic sensors carried by overhead platforms. To assure
timeliness, intelligence gained from imagery must be disseminated to COs
electronically. This is done as opposed to sending them photographically.
Imagery can be the most accurate data for the production of intelligence,
but it is limited.
timeliness are limitations.
Within the intelligence community and
throughout the military, imagery may also be referred to as PHOTINT. This
is an acronym for photographic intelligence.
8.
support measures (ESM), and electronic counter measures (ECM). Actions are
taken by ESM to search for, intercept, identify or locate sources of
radiated electromagnetic energy.
All of these must have immediate threat
9.
Military Deception.
Activities are designed to mislead the enemy
regarding friendly intentions.
This is done by employing visual, sonic,
electronic, olfactory, or other means. The goal is to manipulate, distort,
MP1002
1-4