SIGINT = Advantages and Disadvantages

image.png

Intro

I'm stuck hallway through a masters program in Intelligence Studies (spy, not IQ). Last year I shared some work that I had done. Since my arm is fugazzi, I'm returning to the sharing of that work.

The elephant in the room

I doubt there is anybody left in the country that has any trust at all in the IC. I certainly don't, and that sometimes show up in my work.

I do think there is still value to you the reader here. Espionage is like informationwar or a gun. it is a tool to use when necessary. While the everyday Hiver doesn't have a taxpayer-filled bag of money to support their own agency, there is a lot of education that is valuable to me (and I think to you). Part that if you can explain where the IC has fallen from where it should be, your arguments against it, or for its reform or for its disbandment will carry more weight.

And on to the show

SIGNAL INTELLIGENCE

Signals Intelligence (SIGINT) is one of those technologically advanced categories of collection and serves as a key intelligence collection discipline. It has also come under a lot of scrutiny given its mass surveillance abilities. For this week’s forum posting: Categorize the challenges facing the SIGINT community and analyze some of the implications of these challenges for the future.

SIGINT has a great capability to collect data for intelligence. Aid and Weibes (2001) summarize the benefits (not all are listed, as some were discussed in terms of Cold War application):

  • Sigint is a passive intelligence collection technique that generally is conducted without the target’s knowledge (However, Silverstein (2015) notes that a target who is aware of being a collection target can take simple steps to mitigate SIGINT collection)
  • the objectivity and reliability of Sigint is great, but far from perfect
  • some but certainly not all Sigint intercepts can stand on their own without the need for analysis or correlation with other sources
  • Sigint was usually the fastest source of current intelligence information available to consumers.
  • Sigint produces more intelligence information on a broader range of subjects than any other intelligence source (Written in 2001, this article may be dated in terms of Big Data and OSINT)
  • Sigint never sleeps
  • Sigint is flexible and more responsive to consumer tasking
  • intelligence insiders argue that Sigint’s potential as an intelligence source is greater than all other intelligence collection disciplines (again, this is open to dispute, and we still need to keep in mind that verification of data by multiple sources is best)
  • one of the most cost effective means of gathering intelligence.

However, despite the advantages of the SIGINT discipline, it also is presented with multiple challenges.

The first challenge is common to all disciplines in that SIGINT can be managed with a lack of critical thinking. Berkowitz (2008) and Rudner (2015) note the changing nature of the threat environment, which includes non-conventional threats. Aid (20003) points out that even after 9/11, “substantially larger collection resources [were] being devoted to higher-priority transnational intelligence targets, such as trying to stem the flow of illegal narcotics from Latin America and countering the proliferation of weapons of mass destruction around the world.”

A second issue is that technology can be relied on too much. Berkowitz (2008) further acknowledges that technology is constantly changing, as well as threat. Agrell (2012) argues that technology has been misused as a “universal solution". In addition, Warner (2012) claims that “technology’s impact on intelligence has been incompletely examined.” A more challenging disadvantage is that over-reliance on SIGINT can diminish the proper use of HUMINT. Silverstein (2015) quotes a former CIA agent; “SIGINT, he added, ‘doesn’t tell you anything about context or your target’s plans and intentions. To get that you need human intelligence.’” However, Aid (2003) makes a countering argument that HUMINT may be extremely difficult in some cases, such as penetrating Al-Quaeda.

A final challenge is also shared with other collection disciplines, that of civil rights, namely privacy. Thompson (2011) lays out a fundamental right:
The fountainhead of privacy in the United States is the Fourth Amendment, which ensures that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated....” For at least the past 50 years, this provision has been subject to more litigation than any other in the Bill of Rights. This may come as no surprise, considering the Fourth Amendment protects, as Justice Brandeis put it, “the right to be let alone—the most comprehensive of rights and the right most valued by civilized men.

Schlanger (2015) claims that the SIGINT performed by the NSA complies with the law, but she makes two points regarding that compliance under what she terms “Intelligence legalism”:

  • Intelligence Legalism Crowds Out Interest Balancing: “they have asked only ‘Can we (legally) do X?’ and not ‘Should we do X?’”
  • Intelligence Legalism and Legitimation: by putting things in legal terms, actions that may be counter to the privacy/security balance are legitimized

In conclusion, we should consider the use of SIGINT in terms of critical thinking and ultimate mission. SIGINT should be collected where it is efficient, it should be verified whenever possible with other sources, it’s capabilities should be monitored for change, and it should be employed with the goals of protecting Americans and their civil rights.

References:
Aid, M. M. (2003). All Glory is Fleeting: Sigint and the Fight Against International Terrorism. Intelligence & National Security, 18(4), 72–120. https://doi.org/10.1080/02684520310001688880

Aid, M. M., & Wiebes, C. (2001). Introduction on The Importance of Signals Intelligence in the Cold War. Intelligence and National Security, 16(1), 1–26. https://doi.org/10.1080/714002838

Agrell, W. (2012). The Next 100 Years? Reflections on the Future of Intelligence. Intelligence and National Security, 27(1), 118–132. https://doi.org/10.1080/02684527.2012.621601
Berkowitz, B. (2008). The R&D Future of Intelligence. Issues in Science and Technology (24)3

Rudner, M. (2013). Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge. International Journal of Intelligence and CounterIntelligence, 26(3), 453–481. https://doi.org/10.1080/08850607.2013.780552

Schlanger, M. (2015). Intelligence Legalism and the National Security Agency’s Civil Liberties Gap. Harvard National Security Journal, 6, 94.

Silverstein, K. (2015, September 11). US Reliance on Too Much SIGINT and Too Little Spycraft Is Dangerous and Expensive. Retrieved December 3, 2019, from Observer website: https://observer.com/2015/09/us-reliance-on-too-much-sigint-and-too-little-spycraft-is-dangerous-and-expensive/

Thompson, R. M. (2011). Governmental Tracking of Cell Phones and Vehicles: The Confluence of Privacy, Technology, and Law (p. 25). Congressional Research Service.

Warner, M. (2012). Reflections on Technology and Intelligence Systems. Intelligence and National Security, 27(1), 133–153. https://doi.org/10.1080/02684527.2012.621604
Weinbaum, C., Berner, S., & McClintock, B. (2017). SIGINT for Anyone: The Growing Availability of Signals Intelligence in the Public Domain. https://doi.org/10.7249/PE273

@ Notes

WEEK 5: Signals Intelligence (SIGINT) Lesson Overview. (n.d.).

we will explore the background and intricacies that define Signals Intelligence (SIGINT). The development of more sophisticated forms of communication, most particularly with wireless communications, resulted in the formation of electronic intercept capabilities. The Second World War (1939-1945) saw a dramatic increase in wireless communications not only to direct far-flung activities on a global scale, but also on the tactical battlefield. Additionally, these communications were not only transmitted “in-the-clear” but also employed sophisticated methods of encryption. It was during this period that the United States and its Allies started creating early computers to decrypt these communications and to provide the strategic advantage to win the war.

The period after the Second World War also ushered in advances in technology. It also saw the emergence of the Soviet Union as a global power and the initiation of the Cold War. With much of the Eastern bloc controlled by the Soviets and with limited access to the West, the employment of SIGINT activities provided much of the “reach” into the Eastern bloc to gauge adversary intent. Additionally, the employment of SIGINT activities evolved into operating at various layers and domains: space, cyber, airborne, ground, and maritime environments. Today, the SIGINT community spans the globe attempting to glean relevant and pertinent intelligence across a broad spectrum of communications.
Lesson Objectives

Students will be able to:

Examine the role of Intelligence Collection as it applies to Indications & Warning (I&W) and preventing surprise.
Distinguish the strengths and limitations of various intelligence collection disciplines.

Specific Topics of Discussion

In this lesson, we will discuss:

The strengths and limitations of SIGINT activities.
The challenges facing the SIGINT community within the modern-day Intelligence Community.

Key Learning Concepts

Key Learning Concept 1

The evolution of Signals Intelligence (SIGINT) occurred during the Second World War. The rise of the Soviet Union after the war and the initiation of the Cold War resulted further gave the impetus to grow a SIGINT community capable of accessing targets behind the “Iron Curtain” and the Eastern bloc. Much of the reliance on SIGINT was also the result of limited HUMINT access into the Soviet Union. As technology advanced to include more sophisticated forms of communication, the SIGINT community also grew exponentially to collect, process, and exploit these new communications forms.

Key Learning Concept 2

The SIGINT community has evolved into a vast and complex enterprise aimed at targeting communications globally. With increasing use of more sophisticated communication forms, such as used of email, smartphones, digital tablets, and commercial encryption, the SIGINT community faces increasing challenges in keeping up with the demand for its services. Additionally, with the disclosures by Wikileaks and Edward Snowden, the issues facing privacy concerns and government surveillance have reentered into the public discourse. As a result, while SIGINT continues to serve as an excellent source of intelligence, rising challenges given privacy concerns will continue to bring forth into question many of its activities.

Berkowitz, B. (2008). The R&D Future of Intelligence. Issues in Science and Technology (24)3

US long history dependence on technology
2 challenges:
1 – threats are changing, so intel requirments are changining
2 – technology is changing
historically, R7D performed within the united states and funded by govt
now, R&D poerformed outside US by private comopanies

Rudner, Martin. “Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge.” International Journal of Intelligence and Counterintelligence 26 (2015)

“A remarkable attribute of Information and Communications Technology(ICT) is its almost global accessibility,and that technical competencies incomputers are likewise widespread within and across most communities.

.International terrorism, most notably al-Qaeda and its auxiliaries.
State-sponsored terrorism, espionage, and sabotage.
Malevolent hacktivism.
Insider threats

“While many instances can be categorized under one of these headings, thenew cyber dimension has obviously blurred the lines between them “

image.png

“Dr. Ayman al-Zawahiri issued a video pronouncement inFebruary 2011, urging jihadist operatives to innovate and find new waysand means of attacking high value infrastructure targets:If we are not able to produce weapons equal to the weapons of theCrusader West, we can sabotage their complex economic and industrialsystems and drain their powers....Therefore, the mujahideen [Islamicwarriors] must invent new ways, ways that never dawned on the mindsof the West. “

“The first recorded incident of a relatively successful large-scale terrorist cyberattack on corporate computer systems, attributed to the Tariq bin ZiyadBrigades for Electronic Jihad, took place in 2010. While no evidence is yetavailable of systematic cyber-terrorism on the part of al-Qaeda or itsaffiliates, the updated United Kingdom (UK) counter-terrorism strategy(‘‘CONTEST 2’’), introduced in July2011, warned that in the aftermaththe death of Osama bin Laden, al-Qaeda had called explicitly for ‘‘cyberjihad,’’ along with other terror operations.21 “

Schlanger, Margo. “Intelligence Legalism and the National Security Agency’s Civil Liberties Gap.” Harvard National Security Journal 6, (2015): 112-205.

“the picture that emerges from both the Snowden and official disclosures is of an agency committed to legal compliance, although both minor and major noncompliance is nonetheless frequent. “

ME: Ok, sure, I believe you

“The NSA and the administration in which it sits have thought of civil liberties and privacy only in compliance terms. That is, they have asked only “Canwe (legally) do X?” and not “Shouldwe do X?”This preference for the canquestion over the shouldquestion is part and parcel, I argue, of a phenomenon I label “intelligence legalism,” whose three crucial and simultaneous features are imposition of substantive rules given the status of law rather than policy; some limited court enforcement of those rules; and empowerment of lawyers. Intelligence legalism has been a useful corrective to the lawlessness that characterized surveillance prior to intelligence reform, in the late 1970s. But I argue that it gives systematically insufficient weight to individual liberty, and that its relentless focus on rights, and compliance, and law has obscured the absence of what should be an additional focus on interests, or balancing, or policy. “

“Efforts to implement most of the Church Committee’s substantive recommendations as statutory law failed; they entered American law instead as part of Executive Order 12,333.As already quoted, the Executive Order does expressly state(in language unchanged from its 1981 promulgation): “Set forth below are certain general principles that, in addition to and consistent with applicable laws, are intended to achieve the proper balance between the acquisition of essential information and protection of individual interests.”301That is, one of 12,333’s purposes is to fill the civil liberties gap left by constitutional and statutory law “

“Within a particular organization such as the NSA, the impact of a rights and compliance frame is to allocate decision-making to lawyers.If those lawyers have a civil libertarian orientation, this could be a channel by which rights and compliance serve civil liberties interests.That is, one could imagine that agency lawyers might systematically exercise a pro-liberty orientation, which could fill gaps that might otherwise exist.However, multiplying accounts of lawyers in the Intelligence Community suggest otherwise.A growing shelf-full of articles and books document and even celebrate the lawyers who now populate the military, the CIA, and the Department of Justice’s National Security Division.Jack Goldsmith, for example, has labeled these lawyers a key part of “something new and remarkable,” describing “giant distributed networks of lawyers, investigators, and auditors, both inside and outside the executive branch, that rendered U.S. fighting forces and intelligence services more transparent than ever, and that enforced legal and political constraints, small and large, against them.” “

“1. Intelligence Legalism Crowds Out Interest Balancing “
2 “Intelligence Legalism and Legitimation “

ME: Collyers 2017 FISC ruling?

Thompson, Richard M. Governmental Tracking of Cell Phones and Vehicles: The Confluence of Privacy, Technology, and Law. Washington DC: Congressional Research Service, 2011

“The fountainhead of privacy in the United States is the Fourth Amendment, which ensures that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated....”6 For at least the past 50 years, this provision has been subject to more litigation than any other in the Bill of Rights.7 This may come as no surprise, considering the Fourth Amendment protects, as Justice Brandeis put it, “the right to be let alone—the most comprehensive of rights and the right most valued by civilized men. “

“A recurrent theme flows through Fourth Amendment cases: criminals devise new ways to commit crimes and evade the police; the police devise new ways to intercept communications and detect criminal conduct; and the courts are left to sort out the constitutional from the not in these new contexts. In 1928, for example, when police eavesdropped on the telephone conversations of Roy Olmstead and his bootlegging conspirators, the Court refused to label this a violation of the Constitution because the police had not physically trespassed on the defendants’ properties in making the wiretaps. “

“Almost 40 years later the Court changed course, radically altering the constitutional contours of protected privacy by determining that “the Fourth Amendment protects people, not places.”12 In Katz v. United States, “

Weinbaum, C., Berner, S., & McClintock, B. (2017). SIGINT for Anyone: The Growing Availability of Signals Intelligence in the Public Domain. https://doi.org/10.7249/PE273

“Historically, only govern-ment had the financial means and the legal authority to conduct SIGINT activities, and, in our experience, many members of the U.S. government still hold this opinion today. We tested this viewpoint by conducting a market scan to seek examples of how new technologies, innovations, and behaviors are challenging the existing government-only paradigm “

Aid, M. M. (2003). All Glory is Fleeting: Sigint and the Fight Against International Terrorism. Intelligence & National Security, 18(4), 72–120. https://doi.org/10.1080/02684520310001688880

“ a former senior NSA official indicated that the
Sigint collection and processing resources dedicated to the terrorist problem
by the agency at the time were relatively modest when compared with the
substantially larger collection resources being devoted to higher-priority
transnational intelligence targets, such as trying to stem the flow of illegal
narcotics from Latin America and countering the proliferation of weapons
of mass destruction around the world”

“ from a Humint perspective, trying to penetrate the Al-Qaeda
organization was, and remains, a difficult proposition given its unusual
internal makeup”

H2
H3
H4
3 columns
2 columns
1 column
Join the conversation now
Ecency