SlideShare une entreprise Scribd logo
1  sur  3
WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR

Tracey Percifield

INTEL502 B004 Sum 12

07/18/2012

                             MASINT and the Global War on Terror

We all know that gathered information by any means can be an important factor in making
decisions when our Nation and our military needs are concern, and millions of lives rest in the
hands of the policy makers that give the go ahead to invade, bomb, rescue or pull out.

MASINT (Measurement and Signature Intelligence) collects more of a scientific and technical
approach for strategic and tactical purposes. This type of information builds and analyzes models
that help aide in strategies and tactical categories of data. The biggest problem with this type of
information is that it is complicated and hard to apply when you need it right away. The ones that
more so understand this process are the IT, Forensic Science and projecting and analyzing for
future purposes as in communities and regions of populations (House of Representatives, n.d.).

Having this basic information and function we’ll view an investigation in which President Bush
signed into action Executive Order 13328 on 6 February 2004 and implementing the
investigation and assessing the Intelligence Community in how they function in various areas.
The Commission on Intelligence Group was challenged to address the capabilities and functions
of the Intelligence Committee (IC) and their function of collecting, processing, analyzing, and
other areas of expertise in relations to foreign countries (Stone, 2006).

These challenges and inquiry into the investigation was brought aboutby the invasion to the Iraq
and the need to capture Saddam Hussein and his Weapons of Mass Destruction, fearing that he
would help support terrorist groups and supply them for their missions. When the report was
completed there were seventy-four areas that needed improving and President Bush ordered
seventy-one of them to be reformed in the Intelligence Reform and Terrorism Prevention Act
(IRTPA) on December of 2004 (Stone, 2006). This Act established two things; the director of the
Intelligence and for the Counterterrorism Center and implemented information sharing between
Intelligence Committee members (Stone, 2006).

This was an important step because the use of various forms of Intelligence gathering affects the
changes we have today. In the use of MASINT we share and rely on technology, analysis,
building of models, strategic strategy and for population and regions that will be affected in areas
of war. The question now becomes, “how does this have an effect on the Global War of Terror
and what role will it play.”

Technology plays a huge portion in all we do; we rely in it in every aspect of our lives from our
energy needs to protecting our nation to supplying our information needs in a global way. In
providing our information needs we also realize that other individuals and groups use

                                                 1
WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR

information for their own advantage, their own mission and to create global terror and crime.
The easiest way to do this is through the internet. We already know the capabilities of
Cyberspace, it is unlimited and endless. We already know about the new virus “Flame” and its
limitless Cyber-Weapon intentions and capabilities; we have just established the Global War of
Terror (ITU, 2012).

How to counterattack this issue? Since there is no limit to technology as there is no limit to
MASINT or the internetwe can begin by looking at pathways, plotting, planning analyzing
projects to evaluate issues now and apply them to our future or potential issues that may or can
occur. When using all the sources related to MASINT we can track and use criminals networking
system which in many aspects cross terrorist networks. Where there is crime there is always
much more to follow. This technology plays the game that many criminals and terrorist play and
by using their own networks against them helps play a part in counterintelligence attack to the
problem and grabbing a whole on it in the future. Brigadier General (Ret.) Howard agrees with
this theory and is the founder director of Jebsen Center for Counter Terrorism Studies and has
researched this area and agrees, this is one consideration in the approach to terrorist and the
terror the inflict upon individuals and countries. Either way you look at defeating the Global War
on Terror it will have to be played some way using their own technology against them and
MASINT will provide much of the way (Howard, 2007).

In conclusion Intelligence sources will keep changing and methods that are currently used will be
redefined and replaced with newer technology. With new technology and scientific capabilities
being proved and more effective than older techniques our way of sourcing information is going
to change. In this change we will rely on hands on technique and different formulas for counter
attacks using new technology and perhaps using technology created from the enemy against
them to defeat them. There’s no limit and ideas are endless so the future is a work in progress for
all to visualize.

House of Representatives, . "IC21: The Intelligence Community in the 21st Century." Gpo.gov.
Gpo.gov, n.d.. Web. 11 Jun 2012. <http://www.gpo.gov/fdsys/pkg/GPO-IC21/html/GPO-IC21-
7.html>.

Howard, Russell D. Global Security, US Military Department. (2007). Intelligence in denied
areas: New concepts for a changing security enviroment. Retrieved from Joint Special
Operations University website:
http://www.globalsecurity.org/military/library/report/2007/0712_jsou-report-07-10.pdf


ITU, . International Telecommunication Union. United Nations. Faqs on Flame. Geneva,
Switzerland: United Nations, 2012. Web.
<http://www.itu.int/cybersecurity/Articles/FAQs_on_FLAME.pdf>



                                                2
WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR

Stone, Cristina M. US Federal Government, (2006). Air force intelligence role in combating
weapons of mass destruction (Maxwell Paper No. 39). Retrieved from US Air Force website:
http://www.au.af.mil/au/awc/awcgate/maxwell/mp39.pdf




                                               3

Contenu connexe

Tendances

Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and TerrorismAmanda Tapp
 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)pavithra M
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
DARPA Breakthrough Technologies for National Security − 2015
DARPA Breakthrough Technologies for National Security − 2015DARPA Breakthrough Technologies for National Security − 2015
DARPA Breakthrough Technologies for National Security − 2015Ilya Klabukov
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
Cross-platform communication and context: assessing social media engagement i...
Cross-platform communication and context: assessing social media engagement i...Cross-platform communication and context: assessing social media engagement i...
Cross-platform communication and context: assessing social media engagement i...Luigi Di Martino
 
Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusioncsandit
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaREVULN
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesChikere Uchegbu
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Jose Gonzalez
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesNora A. Rahim
 

Tendances (17)

Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Teaching intelligence
Teaching intelligenceTeaching intelligence
Teaching intelligence
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and Terrorism
 
Haaretz
HaaretzHaaretz
Haaretz
 
Doomsday software (2)
Doomsday software (2)Doomsday software (2)
Doomsday software (2)
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
DARPA Breakthrough Technologies for National Security − 2015
DARPA Breakthrough Technologies for National Security − 2015DARPA Breakthrough Technologies for National Security − 2015
DARPA Breakthrough Technologies for National Security − 2015
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Cross-platform communication and context: assessing social media engagement i...
Cross-platform communication and context: assessing social media engagement i...Cross-platform communication and context: assessing social media engagement i...
Cross-platform communication and context: assessing social media engagement i...
 
Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusion
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
 
How to get started with Data Journalism
How to get started with Data JournalismHow to get started with Data Journalism
How to get started with Data Journalism
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 

Similaire à MASINT and Global War on Terror

Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
Acg Terr Sand2004 2130w
Acg Terr Sand2004 2130wAcg Terr Sand2004 2130w
Acg Terr Sand2004 2130wNKHAYDEN
 
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docxalinainglis
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation OllieShoresna
 
Assessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence ReportingAssessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence ReportingHannah Baker
 
Human Rights Council Study Guide
Human Rights Council Study GuideHuman Rights Council Study Guide
Human Rights Council Study Guidedudasings
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...adnis1
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docxouldparis
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informaticsmali chum
 
HIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanHIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanDavid Sweigert
 
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...UN Global Pulse
 
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...ALexandruDaia1
 
Big data for development
Big data for development Big data for development
Big data for development Junaid Qadir
 

Similaire à MASINT and Global War on Terror (20)

Sais.34.1
Sais.34.1Sais.34.1
Sais.34.1
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
Acg Terr Sand2004 2130w
Acg Terr Sand2004 2130wAcg Terr Sand2004 2130w
Acg Terr Sand2004 2130w
 
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
 
Assessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence ReportingAssessing The Role Of Social Media And Digital Technology In Violence Reporting
Assessing The Role Of Social Media And Digital Technology In Violence Reporting
 
Human Rights Council Study Guide
Human Rights Council Study GuideHuman Rights Council Study Guide
Human Rights Council Study Guide
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informatics
 
E2112733
E2112733E2112733
E2112733
 
HIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response PlanHIMSS Response to DHS National Cyber Incident Response Plan
HIMSS Response to DHS National Cyber Incident Response Plan
 
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
 
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
 
Big data for development
Big data for development Big data for development
Big data for development
 

Plus de Tpeisi Nesby

Intl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfareIntl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfareTpeisi Nesby
 
Environmental science
Environmental scienceEnvironmental science
Environmental scienceTpeisi Nesby
 
Environmental science.traceypercifield.unit1ip
Environmental science.traceypercifield.unit1ipEnvironmental science.traceypercifield.unit1ip
Environmental science.traceypercifield.unit1ipTpeisi Nesby
 
Til.tracey percifield.unit1ip
Til.tracey percifield.unit1ipTil.tracey percifield.unit1ip
Til.tracey percifield.unit1ipTpeisi Nesby
 
Group project.traceypercifield.unit3group
Group project.traceypercifield.unit3groupGroup project.traceypercifield.unit3group
Group project.traceypercifield.unit3groupTpeisi Nesby
 
Tcls.tracey percifield.unit4db
Tcls.tracey percifield.unit4dbTcls.tracey percifield.unit4db
Tcls.tracey percifield.unit4dbTpeisi Nesby
 
Tracey.percifield.atcj.unit5 ip
Tracey.percifield.atcj.unit5 ipTracey.percifield.atcj.unit5 ip
Tracey.percifield.atcj.unit5 ipTpeisi Nesby
 
Policing power and publics privacy rights.unit 3 ip
Policing power and publics privacy rights.unit 3 ipPolicing power and publics privacy rights.unit 3 ip
Policing power and publics privacy rights.unit 3 ipTpeisi Nesby
 
Entrepreneurship unit 5_group_project
Entrepreneurship unit 5_group_projectEntrepreneurship unit 5_group_project
Entrepreneurship unit 5_group_projectTpeisi Nesby
 
Sex offenders and the law.tracey.percifield.unit4 ip
Sex offenders and the law.tracey.percifield.unit4 ipSex offenders and the law.tracey.percifield.unit4 ip
Sex offenders and the law.tracey.percifield.unit4 ipTpeisi Nesby
 
Psychology.tracey percifield.unit4ip.humanmemory
Psychology.tracey percifield.unit4ip.humanmemoryPsychology.tracey percifield.unit4ip.humanmemory
Psychology.tracey percifield.unit4ip.humanmemoryTpeisi Nesby
 
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalena
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalenaGroup project.unit5.tracey.roshanda.michael.daniel.leighton.shalena
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalenaTpeisi Nesby
 

Plus de Tpeisi Nesby (12)

Intl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfareIntl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfare
 
Environmental science
Environmental scienceEnvironmental science
Environmental science
 
Environmental science.traceypercifield.unit1ip
Environmental science.traceypercifield.unit1ipEnvironmental science.traceypercifield.unit1ip
Environmental science.traceypercifield.unit1ip
 
Til.tracey percifield.unit1ip
Til.tracey percifield.unit1ipTil.tracey percifield.unit1ip
Til.tracey percifield.unit1ip
 
Group project.traceypercifield.unit3group
Group project.traceypercifield.unit3groupGroup project.traceypercifield.unit3group
Group project.traceypercifield.unit3group
 
Tcls.tracey percifield.unit4db
Tcls.tracey percifield.unit4dbTcls.tracey percifield.unit4db
Tcls.tracey percifield.unit4db
 
Tracey.percifield.atcj.unit5 ip
Tracey.percifield.atcj.unit5 ipTracey.percifield.atcj.unit5 ip
Tracey.percifield.atcj.unit5 ip
 
Policing power and publics privacy rights.unit 3 ip
Policing power and publics privacy rights.unit 3 ipPolicing power and publics privacy rights.unit 3 ip
Policing power and publics privacy rights.unit 3 ip
 
Entrepreneurship unit 5_group_project
Entrepreneurship unit 5_group_projectEntrepreneurship unit 5_group_project
Entrepreneurship unit 5_group_project
 
Sex offenders and the law.tracey.percifield.unit4 ip
Sex offenders and the law.tracey.percifield.unit4 ipSex offenders and the law.tracey.percifield.unit4 ip
Sex offenders and the law.tracey.percifield.unit4 ip
 
Psychology.tracey percifield.unit4ip.humanmemory
Psychology.tracey percifield.unit4ip.humanmemoryPsychology.tracey percifield.unit4ip.humanmemory
Psychology.tracey percifield.unit4ip.humanmemory
 
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalena
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalenaGroup project.unit5.tracey.roshanda.michael.daniel.leighton.shalena
Group project.unit5.tracey.roshanda.michael.daniel.leighton.shalena
 

Dernier

BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Developmentnarsireddynannuri1
 
28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)Delhi Call girls
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackPsychicRuben LoveSpells
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Tableget joys
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfFahimUddin61
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhbhavenpr
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 

Dernier (20)

BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdf
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 

MASINT and Global War on Terror

  • 1. WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR Tracey Percifield INTEL502 B004 Sum 12 07/18/2012 MASINT and the Global War on Terror We all know that gathered information by any means can be an important factor in making decisions when our Nation and our military needs are concern, and millions of lives rest in the hands of the policy makers that give the go ahead to invade, bomb, rescue or pull out. MASINT (Measurement and Signature Intelligence) collects more of a scientific and technical approach for strategic and tactical purposes. This type of information builds and analyzes models that help aide in strategies and tactical categories of data. The biggest problem with this type of information is that it is complicated and hard to apply when you need it right away. The ones that more so understand this process are the IT, Forensic Science and projecting and analyzing for future purposes as in communities and regions of populations (House of Representatives, n.d.). Having this basic information and function we’ll view an investigation in which President Bush signed into action Executive Order 13328 on 6 February 2004 and implementing the investigation and assessing the Intelligence Community in how they function in various areas. The Commission on Intelligence Group was challenged to address the capabilities and functions of the Intelligence Committee (IC) and their function of collecting, processing, analyzing, and other areas of expertise in relations to foreign countries (Stone, 2006). These challenges and inquiry into the investigation was brought aboutby the invasion to the Iraq and the need to capture Saddam Hussein and his Weapons of Mass Destruction, fearing that he would help support terrorist groups and supply them for their missions. When the report was completed there were seventy-four areas that needed improving and President Bush ordered seventy-one of them to be reformed in the Intelligence Reform and Terrorism Prevention Act (IRTPA) on December of 2004 (Stone, 2006). This Act established two things; the director of the Intelligence and for the Counterterrorism Center and implemented information sharing between Intelligence Committee members (Stone, 2006). This was an important step because the use of various forms of Intelligence gathering affects the changes we have today. In the use of MASINT we share and rely on technology, analysis, building of models, strategic strategy and for population and regions that will be affected in areas of war. The question now becomes, “how does this have an effect on the Global War of Terror and what role will it play.” Technology plays a huge portion in all we do; we rely in it in every aspect of our lives from our energy needs to protecting our nation to supplying our information needs in a global way. In providing our information needs we also realize that other individuals and groups use 1
  • 2. WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR information for their own advantage, their own mission and to create global terror and crime. The easiest way to do this is through the internet. We already know the capabilities of Cyberspace, it is unlimited and endless. We already know about the new virus “Flame” and its limitless Cyber-Weapon intentions and capabilities; we have just established the Global War of Terror (ITU, 2012). How to counterattack this issue? Since there is no limit to technology as there is no limit to MASINT or the internetwe can begin by looking at pathways, plotting, planning analyzing projects to evaluate issues now and apply them to our future or potential issues that may or can occur. When using all the sources related to MASINT we can track and use criminals networking system which in many aspects cross terrorist networks. Where there is crime there is always much more to follow. This technology plays the game that many criminals and terrorist play and by using their own networks against them helps play a part in counterintelligence attack to the problem and grabbing a whole on it in the future. Brigadier General (Ret.) Howard agrees with this theory and is the founder director of Jebsen Center for Counter Terrorism Studies and has researched this area and agrees, this is one consideration in the approach to terrorist and the terror the inflict upon individuals and countries. Either way you look at defeating the Global War on Terror it will have to be played some way using their own technology against them and MASINT will provide much of the way (Howard, 2007). In conclusion Intelligence sources will keep changing and methods that are currently used will be redefined and replaced with newer technology. With new technology and scientific capabilities being proved and more effective than older techniques our way of sourcing information is going to change. In this change we will rely on hands on technique and different formulas for counter attacks using new technology and perhaps using technology created from the enemy against them to defeat them. There’s no limit and ideas are endless so the future is a work in progress for all to visualize. House of Representatives, . "IC21: The Intelligence Community in the 21st Century." Gpo.gov. Gpo.gov, n.d.. Web. 11 Jun 2012. <http://www.gpo.gov/fdsys/pkg/GPO-IC21/html/GPO-IC21- 7.html>. Howard, Russell D. Global Security, US Military Department. (2007). Intelligence in denied areas: New concepts for a changing security enviroment. Retrieved from Joint Special Operations University website: http://www.globalsecurity.org/military/library/report/2007/0712_jsou-report-07-10.pdf ITU, . International Telecommunication Union. United Nations. Faqs on Flame. Geneva, Switzerland: United Nations, 2012. Web. <http://www.itu.int/cybersecurity/Articles/FAQs_on_FLAME.pdf> 2
  • 3. WEEK 3: MASINT AND THE GLOBAL WAR ON TERROR Stone, Cristina M. US Federal Government, (2006). Air force intelligence role in combating weapons of mass destruction (Maxwell Paper No. 39). Retrieved from US Air Force website: http://www.au.af.mil/au/awc/awcgate/maxwell/mp39.pdf 3