Skip to main content icon/video/no-internet

The targets of intelligence gathering related to terrorism are not terribly different from those related to traditional conflicts with nation-states. Intelligence services must collect information that will provide decision makers with knowledge of terrorist organizations, including their leaders, operatives, and supporters; their organizational infrastructure; and their financial and military resources. The methods employed for gathering this intelligence have not changed substantially in some time. Intelligence services seek to intercept the communications or signals intelligence (SIGINT) of terrorist networks, to capture photographic evidence (imagery intelligence, or IMINT) of terrorist activities, and to acquire human assets (human intelligence, or HUMINT) with direct knowledge of terrorist's intentions and capabilities.

Although methods and objectives of intelligence gathering remain substantially the same, terrorism does present several new and distinct challenges to intelligence communities. For example, the revolutionary development of technical systems for gathering SIGINT and IMINT in the twentieth century helped limit the fear of surprise attack. In the twenty-first century, however, these same capabilities have not had the same impact in counterterrorism efforts. Terror networks, relative to nation-states, adapt more readily to changing environments, and their size allows them to hide in the shadows, so they can more readily attack without warning. The nature of the threat thus reduces the amount of security improvement a state can buy through improvements to early warning systems. States facing substantial terrorist threats have responded with targeted operations against terrorist organizations, and intelligence gathering supports that goal.

Sigint

Signals intelligence, or electronic eavesdropping, is the collection of signals from electronic and communications technologies. Virtually any communication system can be penetrated by a vast array of spy satellites, surveillance planes, computers, and telecom equipment around the world. Thus, the challenge for intelligence services is not access, but developing methodologies for pulling actionable intelligence from massive amounts of data. For example, al Qaeda has used both high- and low-technology means to coordinate its activities. In organizing the September 11 attacks, the terrorists exchanged hundreds of e-mails and booked airline tickets online; they also protected their communications by using public computer terminals, anonymous e-mail services, and encrypted websites.

Starting in 2005, intelligence agencies engaged in computer-to-computer signals intelligence exploration and began closely examining Internet protocol network intercepts and forensics analysis as new weapons. Traditional signals intelligence professionals had shied away from this type of intelligence gathering, but they now began to realize that the computer-to-computer intelligence gap could be filled. It is possible to target a section of the Internet—even the sections that originate in small countries—to find targets of interest online. The new technologies enabled security officials to track terrorist suspects internally, and they allowed paramilitary units to spy on terrorist computer communications.

Network forensics allows SIGINT units to capture network traffic for several requirements. Traditional data collection, alerting, and analysis help officials capture targeted e-mail, chat sessions, web pages, file transfer protocol downloads, logs, and Voice over Internet Protocol (VoIP) communications from network gatekeepers such as Internet service providers. It also provides near-real-time analysis and reporting to create actionable intelligence from network traffic. Additionally, it allows the SIGINT units to conduct relational surveys by monitoring contacts of known terrorist suspects, building orders of battle around enemy organizations.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading