SlideShare a Scribd company logo
WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR

Tracey Percifield

INTEL502 B004 Sum 12

07/18/2012

                             MASINT and the Global War on Terror

We all know that gathered information by any means can be an important factor in making
decisions when our Nation and our military needs are concern, and millions of lives rest in the
hands of the policy makers that give the go ahead to invade, bomb, rescue or pull out.

MASINT (Measurement and Signature Intelligence) collects more of a scientific and technical
approach for strategic and tactical purposes. This type of information builds and analyzes models
that help aide in strategies and tactical categories of data. The biggest problem with this type of
information is that it is complicated and hard to apply when you need it right away. The ones that
more so understand this process are the IT, Forensic Science and projecting and analyzing for
future purposes as in communities and regions of populations (House of Representatives, n.d.).

Having this basic information and function we’ll view an investigation in which President Bush
signed into action Executive Order 13328 on 6 February 2004 and implementing the
investigation and assessing the Intelligence Community in how they function in various areas.
The Commission on Intelligence Group was challenged to address the capabilities and functions
of the Intelligence Committee (IC) and their function of collecting, processing, analyzing, and
other areas of expertise in relations to foreign countries (Stone, 2006).

These challenges and inquiry into the investigation was brought aboutby the invasion to the Iraq
and the need to capture Saddam Hussein and his Weapons of Mass Destruction, fearing that he
would help support terrorist groups and supply them for their missions. When the report was
completed there were seventy-four areas that needed improving and President Bush ordered
seventy-one of them to be reformed in the Intelligence Reform and Terrorism Prevention Act
(IRTPA) on December of 2004 (Stone, 2006). This Act established two things; the director of the
Intelligence and for the Counterterrorism Center and implemented information sharing between
Intelligence Committee members (Stone, 2006).

This was an important step because the use of various forms of Intelligence gathering affects the
changes we have today. In the use of MASINT we share and rely on technology, analysis,
building of models, strategic strategy and for population and regions that will be affected in areas
of war. The question now becomes, “how does this have an effect on the Global War of Terror
and what role will it play.”

Technology plays a huge portion in all we do; we rely in it in every aspect of our lives from our
energy needs to protecting our nation to supplying our information needs in a global way. In
providing our information needs we also realize that other individuals and groups use

                                                 1
WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR

information for their own advantage, their own mission and to create global terror and crime.
The easiest way to do this is through the internet. We already know the capabilities of
Cyberspace, it is unlimited and endless. We already know about the new virus “Flame” and its
limitless Cyber-Weapon intentions and capabilities; we have just established the Global War of
Terror (ITU, 2012).

How to counterattack this issue? Since there is no limit to technology as there is no limit to
MASINT or the internetwe can begin by looking at pathways, plotting, planning analyzing
projects to evaluate issues now and apply them to our future or potential issues that may or can
occur. When using all the sources related to MASINT we can track and use criminals networking
system which in many aspects cross terrorist networks. Where there is crime there is always
much more to follow. This technology plays the game that many criminals and terrorist play and
by using their own networks against them helps play a part in counterintelligence attack to the
problem and grabbing a whole on it in the future. Brigadier General (Ret.) Howard agrees with
this theory and is the founder director of Jebsen Center for Counter Terrorism Studies and has
researched this area and agrees, this is one consideration in the approach to terrorist and the
terror the inflict upon individuals and countries. Either way you look at defeating the Global War
on Terror it will have to be played some way using their own technology against them and
MASINT will provide much of the way (Howard, 2007).

In conclusion Intelligence sources will keep changing and methods that are currently used will be
redefined and replaced with newer technology. With new technology and scientific capabilities
being proved and more effective than older techniques our way of sourcing information is going
to change. In this change we will rely on hands on technique and different formulas for counter
attacks using new technology and perhaps using technology created from the enemy against
them to defeat them. There’s no limit and ideas are endless so the future is a work in progress for
all to visualize.

House of Representatives, . "IC21: The Intelligence Community in the 21st Century." Gpo.gov.
Gpo.gov, n.d.. Web. 11 Jun 2012. <http://www.gpo.gov/fdsys/pkg/GPO-IC21/html/GPO-IC21-
7.html>.

Howard, Russell D. Global Security, US Military Department. (2007). Intelligence in denied
areas: New concepts for a changing security enviroment. Retrieved from Joint Special
Operations University website:
http://www.globalsecurity.org/military/library/report/2007/0712_jsou-report-07-10.pdf


ITU, . International Telecommunication Union. United Nations. Faqs on Flame. Geneva,
Switzerland: United Nations, 2012. Web.
<http://www.itu.int/cybersecurity/Articles/FAQs_on_FLAME.pdf>



                                                2
WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR

Stone, Cristina M. US Federal Government, (2006). Air force intelligence role in combating
weapons of mass destruction (Maxwell Paper No. 39). Retrieved from US Air Force website:
http://www.au.af.mil/au/awc/awcgate/maxwell/mp39.pdf




                                               3

More Related Content

What's hot

Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and TerrorismAmanda Tapp
 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)
pavithra M
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
Sara-Jayne Terp
 
DARPA Breakthrough Technologies for National Security − 2015
DARPA Breakthrough Technologies for National Security − 2015DARPA Breakthrough Technologies for National Security − 2015
DARPA Breakthrough Technologies for National Security − 2015
Ilya Klabukov
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
Cross-platform communication and context: assessing social media engagement i...
Cross-platform communication and context: assessing social media engagement i...Cross-platform communication and context: assessing social media engagement i...
Cross-platform communication and context: assessing social media engagement i...
Luigi Di Martino
 
Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusion
csandit
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
REVULN
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesChikere Uchegbu
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Jose Gonzalez
 
How to get started with Data Journalism
How to get started with Data JournalismHow to get started with Data Journalism
How to get started with Data Journalism
Centre for Media Pluralism and Media Freedom
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
Nora A. Rahim
 

What's hot (17)

Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Teaching intelligence
Teaching intelligenceTeaching intelligence
Teaching intelligence
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and Terrorism
 
Haaretz
HaaretzHaaretz
Haaretz
 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
DARPA Breakthrough Technologies for National Security − 2015
DARPA Breakthrough Technologies for National Security − 2015DARPA Breakthrough Technologies for National Security − 2015
DARPA Breakthrough Technologies for National Security − 2015
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Cross-platform communication and context: assessing social media engagement i...
Cross-platform communication and context: assessing social media engagement i...Cross-platform communication and context: assessing social media engagement i...
Cross-platform communication and context: assessing social media engagement i...
 
Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusion
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
 
How to get started with Data Journalism
How to get started with Data JournalismHow to get started with Data Journalism
How to get started with Data Journalism
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 

Similar to MASINT and Global War on Terror

Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
hartrobert670
 
Acg Terr Sand2004 2130w
Acg Terr Sand2004 2130wAcg Terr Sand2004 2130w
Acg Terr Sand2004 2130wNKHAYDEN
 
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
alinainglis
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
OllieShoresna
 
Assessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence ReportingAssessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence Reporting
Hannah Baker
 
Human Rights Council Study Guide
Human Rights Council Study GuideHuman Rights Council Study Guide
Human Rights Council Study Guide
dudasings
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
Christina Berger
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
adnis1
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
ouldparis
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
bodaceacat
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
Quinnipiac University
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
Maurice Dawson
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informaticsmali chum
 
E2112733
E2112733E2112733
E2112733
ajmrdjournals
 
HIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanHIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response Plan
David Sweigert
 
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
UN Global Pulse
 
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
ALexandruDaia1
 
Big data for development
Big data for development Big data for development
Big data for development
Junaid Qadir
 

Similar to MASINT and Global War on Terror (20)

Sais.34.1
Sais.34.1Sais.34.1
Sais.34.1
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
Acg Terr Sand2004 2130w
Acg Terr Sand2004 2130wAcg Terr Sand2004 2130w
Acg Terr Sand2004 2130w
 
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
 
Assessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence ReportingAssessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence Reporting
 
Human Rights Council Study Guide
Human Rights Council Study GuideHuman Rights Council Study Guide
Human Rights Council Study Guide
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informatics
 
E2112733
E2112733E2112733
E2112733
 
HIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanHIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response Plan
 
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
 
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
 
Big data for development
Big data for development Big data for development
Big data for development
 

More from Tpeisi Nesby

Intl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfareIntl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfareTpeisi Nesby
 
Environmental science
Environmental scienceEnvironmental science
Environmental science
Tpeisi Nesby
 
Environmental science.traceypercifield.unit1ip
Environmental science.traceypercifield.unit1ipEnvironmental science.traceypercifield.unit1ip
Environmental science.traceypercifield.unit1ip
Tpeisi Nesby
 
Til.tracey percifield.unit1ip
Til.tracey percifield.unit1ipTil.tracey percifield.unit1ip
Til.tracey percifield.unit1ip
Tpeisi Nesby
 
Group project.traceypercifield.unit3group
Group project.traceypercifield.unit3groupGroup project.traceypercifield.unit3group
Group project.traceypercifield.unit3group
Tpeisi Nesby
 
Tcls.tracey percifield.unit4db
Tcls.tracey percifield.unit4dbTcls.tracey percifield.unit4db
Tcls.tracey percifield.unit4db
Tpeisi Nesby
 
Tracey.percifield.atcj.unit5 ip
Tracey.percifield.atcj.unit5 ipTracey.percifield.atcj.unit5 ip
Tracey.percifield.atcj.unit5 ipTpeisi Nesby
 
Policing power and publics privacy rights.unit 3 ip
Policing power and publics privacy rights.unit 3 ipPolicing power and publics privacy rights.unit 3 ip
Policing power and publics privacy rights.unit 3 ipTpeisi Nesby
 
Entrepreneurship unit 5_group_project
Entrepreneurship unit 5_group_projectEntrepreneurship unit 5_group_project
Entrepreneurship unit 5_group_projectTpeisi Nesby
 
Sex offenders and the law.tracey.percifield.unit4 ip
Sex offenders and the law.tracey.percifield.unit4 ipSex offenders and the law.tracey.percifield.unit4 ip
Sex offenders and the law.tracey.percifield.unit4 ipTpeisi Nesby
 
Psychology.tracey percifield.unit4ip.humanmemory
Psychology.tracey percifield.unit4ip.humanmemoryPsychology.tracey percifield.unit4ip.humanmemory
Psychology.tracey percifield.unit4ip.humanmemoryTpeisi Nesby
 
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalena
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalenaGroup project.unit5.tracey.roshanda.michael.daniel.leighton.shalena
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalenaTpeisi Nesby
 

More from Tpeisi Nesby (12)

Intl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfareIntl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfare
 
Environmental science
Environmental scienceEnvironmental science
Environmental science
 
Environmental science.traceypercifield.unit1ip
Environmental science.traceypercifield.unit1ipEnvironmental science.traceypercifield.unit1ip
Environmental science.traceypercifield.unit1ip
 
Til.tracey percifield.unit1ip
Til.tracey percifield.unit1ipTil.tracey percifield.unit1ip
Til.tracey percifield.unit1ip
 
Group project.traceypercifield.unit3group
Group project.traceypercifield.unit3groupGroup project.traceypercifield.unit3group
Group project.traceypercifield.unit3group
 
Tcls.tracey percifield.unit4db
Tcls.tracey percifield.unit4dbTcls.tracey percifield.unit4db
Tcls.tracey percifield.unit4db
 
Tracey.percifield.atcj.unit5 ip
Tracey.percifield.atcj.unit5 ipTracey.percifield.atcj.unit5 ip
Tracey.percifield.atcj.unit5 ip
 
Policing power and publics privacy rights.unit 3 ip
Policing power and publics privacy rights.unit 3 ipPolicing power and publics privacy rights.unit 3 ip
Policing power and publics privacy rights.unit 3 ip
 
Entrepreneurship unit 5_group_project
Entrepreneurship unit 5_group_projectEntrepreneurship unit 5_group_project
Entrepreneurship unit 5_group_project
 
Sex offenders and the law.tracey.percifield.unit4 ip
Sex offenders and the law.tracey.percifield.unit4 ipSex offenders and the law.tracey.percifield.unit4 ip
Sex offenders and the law.tracey.percifield.unit4 ip
 
Psychology.tracey percifield.unit4ip.humanmemory
Psychology.tracey percifield.unit4ip.humanmemoryPsychology.tracey percifield.unit4ip.humanmemory
Psychology.tracey percifield.unit4ip.humanmemory
 
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalena
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalenaGroup project.unit5.tracey.roshanda.michael.daniel.leighton.shalena
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalena
 

Recently uploaded

Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
rbakerj2
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
ZackSpencer3
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
contact193699
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
CI kumparan
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Slator- Language Industry Intelligence
 
Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
bhavenpr
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
bhavenpr
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
bhavenpr
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
role of women and girls in various terror groups
role of women and girls in various terror groupsrole of women and girls in various terror groups
role of women and girls in various terror groups
sadiakorobi2
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
olaola5673
 

Recently uploaded (13)

Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
 
Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
 
role of women and girls in various terror groups
role of women and girls in various terror groupsrole of women and girls in various terror groups
role of women and girls in various terror groups
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
 

MASINT and Global War on Terror

  • 1. WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR Tracey Percifield INTEL502 B004 Sum 12 07/18/2012 MASINT and the Global War on Terror We all know that gathered information by any means can be an important factor in making decisions when our Nation and our military needs are concern, and millions of lives rest in the hands of the policy makers that give the go ahead to invade, bomb, rescue or pull out. MASINT (Measurement and Signature Intelligence) collects more of a scientific and technical approach for strategic and tactical purposes. This type of information builds and analyzes models that help aide in strategies and tactical categories of data. The biggest problem with this type of information is that it is complicated and hard to apply when you need it right away. The ones that more so understand this process are the IT, Forensic Science and projecting and analyzing for future purposes as in communities and regions of populations (House of Representatives, n.d.). Having this basic information and function we’ll view an investigation in which President Bush signed into action Executive Order 13328 on 6 February 2004 and implementing the investigation and assessing the Intelligence Community in how they function in various areas. The Commission on Intelligence Group was challenged to address the capabilities and functions of the Intelligence Committee (IC) and their function of collecting, processing, analyzing, and other areas of expertise in relations to foreign countries (Stone, 2006). These challenges and inquiry into the investigation was brought aboutby the invasion to the Iraq and the need to capture Saddam Hussein and his Weapons of Mass Destruction, fearing that he would help support terrorist groups and supply them for their missions. When the report was completed there were seventy-four areas that needed improving and President Bush ordered seventy-one of them to be reformed in the Intelligence Reform and Terrorism Prevention Act (IRTPA) on December of 2004 (Stone, 2006). This Act established two things; the director of the Intelligence and for the Counterterrorism Center and implemented information sharing between Intelligence Committee members (Stone, 2006). This was an important step because the use of various forms of Intelligence gathering affects the changes we have today. In the use of MASINT we share and rely on technology, analysis, building of models, strategic strategy and for population and regions that will be affected in areas of war. The question now becomes, “how does this have an effect on the Global War of Terror and what role will it play.” Technology plays a huge portion in all we do; we rely in it in every aspect of our lives from our energy needs to protecting our nation to supplying our information needs in a global way. In providing our information needs we also realize that other individuals and groups use 1
  • 2. WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR information for their own advantage, their own mission and to create global terror and crime. The easiest way to do this is through the internet. We already know the capabilities of Cyberspace, it is unlimited and endless. We already know about the new virus “Flame” and its limitless Cyber-Weapon intentions and capabilities; we have just established the Global War of Terror (ITU, 2012). How to counterattack this issue? Since there is no limit to technology as there is no limit to MASINT or the internetwe can begin by looking at pathways, plotting, planning analyzing projects to evaluate issues now and apply them to our future or potential issues that may or can occur. When using all the sources related to MASINT we can track and use criminals networking system which in many aspects cross terrorist networks. Where there is crime there is always much more to follow. This technology plays the game that many criminals and terrorist play and by using their own networks against them helps play a part in counterintelligence attack to the problem and grabbing a whole on it in the future. Brigadier General (Ret.) Howard agrees with this theory and is the founder director of Jebsen Center for Counter Terrorism Studies and has researched this area and agrees, this is one consideration in the approach to terrorist and the terror the inflict upon individuals and countries. Either way you look at defeating the Global War on Terror it will have to be played some way using their own technology against them and MASINT will provide much of the way (Howard, 2007). In conclusion Intelligence sources will keep changing and methods that are currently used will be redefined and replaced with newer technology. With new technology and scientific capabilities being proved and more effective than older techniques our way of sourcing information is going to change. In this change we will rely on hands on technique and different formulas for counter attacks using new technology and perhaps using technology created from the enemy against them to defeat them. There’s no limit and ideas are endless so the future is a work in progress for all to visualize. House of Representatives, . "IC21: The Intelligence Community in the 21st Century." Gpo.gov. Gpo.gov, n.d.. Web. 11 Jun 2012. <http://www.gpo.gov/fdsys/pkg/GPO-IC21/html/GPO-IC21- 7.html>. Howard, Russell D. Global Security, US Military Department. (2007). Intelligence in denied areas: New concepts for a changing security enviroment. Retrieved from Joint Special Operations University website: http://www.globalsecurity.org/military/library/report/2007/0712_jsou-report-07-10.pdf ITU, . International Telecommunication Union. United Nations. Faqs on Flame. Geneva, Switzerland: United Nations, 2012. Web. <http://www.itu.int/cybersecurity/Articles/FAQs_on_FLAME.pdf> 2
  • 3. WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR Stone, Cristina M. US Federal Government, (2006). Air force intelligence role in combating weapons of mass destruction (Maxwell Paper No. 39). Retrieved from US Air Force website: http://www.au.af.mil/au/awc/awcgate/maxwell/mp39.pdf 3