Upload
john-bofarull-guix
View
221
Download
0
Embed Size (px)
Citation preview
7/24/2019 D Thoelke Buchw713od0e1
1/58
Principles ofRadio Intelligence
Solutions for modern COMINT systemson the basis of TRS
7/24/2019 D Thoelke Buchw713od0e1
2/58
Company Confidential Principles of Radio Intelligence
Page 2/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
MEDAV GmbH
Grfenberger Strae 32-34
91080 Uttenreuth
Germany+49 9131 583-0
+49 9131 583-11
www.medav.de
DocumentPrinciples of Radio Intelligence
w713od.0e1 - Version V1.2, 17 July 2013
AuthorVolkhard Thoelke
CopyrightThis document is protected by copyright laws.
TrademarksFor better legibility, in this document marking of trademarks is waived. This should not mislead to
the assumption that these trademarks are to be used freely by anybody.
Contact for Errors or ComplaintsWhen editing this document, greatest importance was attached to completeness and correctness.
Even so, if you find an error or incompleteness, please contact
MEDAV GmbH,+49 9131 583-0,[email protected]
The document is subject to change without prior announcement.
7/24/2019 D Thoelke Buchw713od0e1
3/58
7/24/2019 D Thoelke Buchw713od0e1
4/58
Company Confidential Principles of Radio Intelligence
Page 4/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
List of diagrams
Figure 1: Radio intelligencean important source of intelligence .......................................................... 7
Figure 2: Overview of radio intelligence ................................................................................................ 16
Figure 3: Overview of IG ........................................................................................................................ 18
Figure 4: IG - searching ......................................................................................................................... 22
Figure 5. IG - Acquisition/Processing ................................................................................................... 27
Figure 6: An overview of IP .................................................................................................................. 32
Figure 7: IPpre-processing ................................................................................................................ 33
Figure 8: IP preliminary analysis ........................................................................................................... 36
Figure 9: Analysis and reporting ............................................................................................................ 38
Figure 10: Military COMINT / radio intelligence ..................................................................................... 41
7/24/2019 D Thoelke Buchw713od0e1
5/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 5/58
1. Intelligenceits contribution to national security
The global political changes in the wake of the dissolution of the Warsaw Pact and the end of the
East-West conflict did not, as hoped, result in greater peace and security the world over. On the
contrary, they have been followed by the development of numerous regional conflict zones withethnic crises and wars.
There has also been a sharp increase in numerous other activities and disputes in many areas of
the world that could jeopardise the security of the international community. As a result, national
security interests are now no longer exclusively concerned with the military threat to their own
countries, and instead the main priorities of national security authorities are now the activities of
terrorist organisations, paramilitary forces, criminal structures in the fields of drugs and human
trafficking and operations involving weapons proliferation, money laundering and white-collar
crime.
This development has led to a reassessment of the security situation in numerous countries and to
a subsequent re-alignment of national security policies with far-reaching consequences for military
organisations, police and security services.
Intelligence obtained on the forces, structures and activities listed above has always played a
decisive roll in the evaluation and improvement of national security situations. Intelligence for the
purposes of defence is intended to help identify the enemys capabilities (potential), objectives,
plans and preparations as early and reliably as possible to enable suitable pre-emptive action or
countermeasures to be initiated in good time. Where this is not possible, the intelligence should at
least monitor the day-to-day activities of the enemy and provide precise situation reports. These
reports can be used as the basis for the implementation of appropriate emergency action and
countermeasures.
All the malevolent forces and organisations mentioned above rely heavily on technology for open
and conspiratorial communications for the command and control and coordination of their
operations. These command and control links are used to plan, prepare and perform actions that
jeopardise our security. Since these forces and organisations are usually active on a supra-
regional level, the necessary command and control links are also established on a supra-regional,
and often even global, level.
This is precisely the starting point with regard to the use of technology to gather intelligence on the
communications channels used. As military forces and the other types of forces mentioned above
all require a high degree of mobility for their operations, their command and control links, i.e. their
communication links, have also been adapted to meet these requirements.
7/24/2019 D Thoelke Buchw713od0e1
6/58
Company Confidential Principles of Radio Intelligence
Page 6/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
Mobile communications are only possible using radio technology. This covers a wide spectrum of
radio services and frequency ranges, from HF radio to satellite radio, and more recently, following
the introduction of wireless data transmission systems, even the use of LAN technology (WLAN).
All of these should be the targets of intelligence gathering.
Radio intelligence, which is generally of a passive nature, and hence cannot be detected by theenemy, can be used to identify the enemys command and control links, and in many cases,
penetrate these links as unauthorised users. However, the usage habits and rules vary greatly
according to the type radio service or the (user) organisation. Consequently, the methods and
equipment used to detect command and control links and gather intelligence relevant to the
mission also vary greatly. The requirements in terms of reconnaissance technology and
reconnaissance personnel are correspondingly high.
The following chapters endeavour to provide a comprehensive overview of radio intelligence (RI)
and to describe the tasks, methods and diverse functional areas in a process-based and general
manner. It is not be possible to go into detail with regard to the numerous methods and strategies
for the acquisition and evaluation of the wide variety of possible communications/signals relevant
to the mission in radio intelligence. This goes beyond the scope of this work and would also violate
the provisions of national security.
Chapter 2.5 deals exclusively with military radio intelligence and its special features plus the
aspects it has in common with the radio intelligence employed in other national
organisations/services.
7/24/2019 D Thoelke Buchw713od0e1
7/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 7/58
1.1. Tasks of radio intelligence
Intelligence generally exploits a wide variety of potential sources. These range from human
sources (HUMINT) right up to airborne or satellite photographic and radar intelligence (IMINT,
SATINT, etc). Within this broad spectrum encompassing the most diverse range of tasks, radio
intelligence represents one important cornerstone of communications intelligence (COMINT).
Figure 1: Radio intel l igence an impo r tant source of inte l l igence
The task of radio intelligence services is to use the medium of radio to find and obtain intelligence
from the command and control links of the targets in question these could be military or
paramilitary organisations as well as terrorist or criminal forces within the focus area of the security
services. Intelligence on these organisations aims at providing timely information on the command
and control and organisational structures and interrelationships and, if possible, their objectives,
plans and current activities.
One of the objectives of radio intelligence is to make important contributions to the assessment of
ones own threat and security situation and, by means of early identification, provide time for pre -
emptive action or suitable countermeasures in the sense of timely interventions. In this way, if
employed successfully at the correct time, radio intelligence can also make a contribution to
conflict and crisis management.
7/24/2019 D Thoelke Buchw713od0e1
8/58
Company Confidential Principles of Radio Intelligence
Page 8/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
1.2. Potential capabilities and limits of radio intelligence
As mentioned, radio intelligence obtains information on the enemy from the enemys radio
communications. Therefore, a basic precondition for this type of intelligence is to findand acquire
the radio communications. In addition to reception, the acquisition task also includes rendering the
signal useful for analysis, to obtain information on the enemy within the remit of the
reconnaissance mission.
This basic task is dependent upon numerous factors:
physical parameters, such as frequency, distance to the emitter, time of day/year
(especially in the HF range), reception level, quality of the radio channel, etc.
operational or technical factors, such as transmitter emission direction, transmit level,
type of radio service, transmission mode, encryption etc.
strategic factors, such as the potential own resources, means of camouflage and hence
possible proximity to the enemy, duration of the acquisition mission, manned or unmanned
use of the reconnaissance technology, etc.
The results of the acquisition and the information directly produced from this are consequently very
different. Frequently, the only intelligence obtained is on the operational parameters of the radio
communications. This is generally the case with encrypted traffic. Nevertheless, when interpreted
correctly, operational findings can also provide information on the strategic background that gave
rise to the radio communications. Such findings are also important for supplementing or updating
ones own target knowledge. This target knowledge is in turn a basic precondition for successful
radio intelligence as it provides decisive (advance) knowledge and hence assists in the detection,
classification, processing and analysis of the radio traffic relevant to the mission.
In conjunction with the target knowledge and supplementary information from other sources,
experienced analysts can often use operational parameters of radio communications to deduce
details of enemy structures, objectives, activities and potential capabilities. This underlines the fact
that, although radio intelligence is important, it is still only one source of intelligence. Only thepooling and joint/ combined analysis of all relevant information from all available sources can
provide a comprehensive and sufficiently reliable picture of the situation.
Here, we should mention an important principle of reconnaissance:
The information and findings obtained from intelligence on objectives, plans, preparation and
performance of activities that pose a threat to security and on the enemys potential capabilities are
exclusively the result of ones own analyses and evaluat ions.There always remains an
unquantifiable uncertainty factor that necessitates the continuous checking and updating of the
results of the reconnaissance.
7/24/2019 D Thoelke Buchw713od0e1
9/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 9/58
2. Radio intelligence in detail
2.1. Terms of reference
The basic mission of radio intelligence is to identify from the numerous emissions in the entire
spectrum of possible frequency ranges those radio communications that are important for ones
own reconnaissance and to acquire, process and analyse them with the aim of obtaining the
required information and knowledge about the enemy from this traffic. Particular importance is
attached to the chains of command, that are the enemys command and control links, since these
generally provide important knowledge on the enemys activities and plans and hence can make
an important contribution to ones assessment of the situation.
These terms of reference are not only applicable to intelligence on military organisations/units.
They are equally applicable to intelligence on terrorist or criminal organisations, the only difference
being that the command and control and communication behaviour in these areas is clearly
different from that used by the military and hence sometimes other approaches to acquisition and
analysis are necessary.
However, the basis objective of all radio intelligence is the same in all operations. Its mission is to
gain intelligence from the radio communications of the target groups in question in terms of:
their locat ion (groups or individual) or place of deploym ent (troops)
their st rength, their capabi l i t ies/ their potent ia l
their object ives and conc rete plans
their preparat ions and on
the implementat ion of all act ions or measures affecting nat ional secur i ty and the
secur i ty of n at ional forces.
One of the main tasks in connection with the above targets is the early detection (early
identification) of enemy plans and preparations. If this is successful, there will be time and
opportunity to take appropriate pre-emptive action. This is an important precondition for crisis
management.
In the military field, radio intelligence is also understood as an early warning systemwith a focus
on tactical events on the battlefield to provide the military commander with important information on
the tactical situation and hence on the threat situation (see also chapter 2.5).
7/24/2019 D Thoelke Buchw713od0e1
10/58
Company Confidential Principles of Radio Intelligence
Page 10/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
2.2. Basic requirements
Two factors determine the efficiency of ones own radio intelligence:
a suitable, high-performance technical infrastructure
experienced and well trained personnel
Technical infrastructure:
Since, from both a technical and a strategic point of view, radio intelligence has to cover a broad
spectrum of tasks, the technology and infrastructure required may vary greatly for different terms of
reference. This means that the preparation of a radio intelligence system for a successful operation
is heavily dependent upon the mission in question and the associated strategic framework. This in
turn places high requirements on the development and design of modern radio intelligence
systems, and in particular on the flexibility that enables them to be adapted simply, rapidly andinexpensively to the changing tasks and requirements.
Chapter 3 describes in detail the innovative way in which MEDAV has dealt with this requirement in
its system solutions.
The following is a list of the basic capability requirements for modern radio intelligence systems:
High per formance recept ion technolog y,
able to detect signals relevant to the mission, even in radio intelligence locations that are
frequently unfavourable for reception technology, and to acquire them in a quality sufficient
for subsequent signal processing. Important influential factors here are antenna gain and
the dynamic response of the receivers.
High prob abi l ity of acquis i t ion
Frequently, radio intelligence gatherers have little or no knowledge of the times at which the
enemy will be active or which radio system, operating mode and frequency will be used.
When searching over large frequency ranges with numerous emissions, only high-capacity,
automatic wideband receivers are able to identify the majority of communications relevant
to the mission at any time, classify them as such and make them accessible to a
processing component.
Direct ion- f inding or locat ion- f inding abi li ty :
Generally, the large number of emissions detected means that wideband detection systems
rapidly reach the limit of their capabilities when classifying emissions with the aim of
selecting only those relevant to the mission, unless effective selection or exclusion criteria
(filters) are used at an early stage in the processing chain to reduce the number ofemissions sent for further processing.
7/24/2019 D Thoelke Buchw713od0e1
11/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 11/58
In the majority of missions, particularly in strategic radio intelligence, specific information is
already available on the known or suspected locations (for target persons/target groups) or
the target areas (for military forces) thanks to prior findings (target knowledge). The
determination of the direction from which a detected emission is received is therefore a very
effective selection criterion at the start of the signal processing chain. This filter is even
more reliable and effective but also much more complex if it is possible to identify the
location of the majority of the signals (see Chapter 2.4.1.5 for further details).
Direction-finding/bearing and location-finding are also important tools for identifying the
emitters detected, that is in the assignment of the transmitters as belonging to the targeted,
i.e. sought users.
High-capaci ty comp uter and storage technology :
Due to the large number of signals and complex processing tasks, the operation of
wideband detection systems has to be automated to a large extent. Automation and the
high number of signals to be classified and processed require a high level of computing
power with a flexible load distribution to enable the system to respond appropriately to the
frequently changing load situations.
Wideband HF detection technology necessitates the intermediate storage of the frequency
interval/range to be processed (time signal). This requirement is met by means of a ring
memory with a high memory depth. The wideband radio intelligence systems from MEDAV
have, as standard, an intermediate storage capacity of several hours.
This dimensioning enables the entire frequency range specified for the mission to be
processed without signal losses. Intermediate storage means that signals classified as low
priority can be processed later and those with an inadequate classification or processing
result can be processed several times (possibly with the assistance of an experienced
operator and suitable analytical tools), until a satisfactory result is obtained.
However, searching for and processing signals in higher frequency ranges (>30 MHz)
requires other technical approaches and strategies, as the frequency range sought isgenerally too extensive for intermediate storage techniques alone(see also Chapter
2.4.1.2).
7/24/2019 D Thoelke Buchw713od0e1
12/58
Company Confidential Principles of Radio Intelligence
Page 12/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
Sui table classi f icat ion and pro cessing p rocedures:
Modern communications technology is making increasing use of complex digital
transmission modes that guarantee high transmission integrity and quality. With their
numerous protocol layers, low channel-adapted transmit levels, high-capacity encryption
procedures and variable usage of the selected frequency band, these modern transmissionmodes place high requirements on the capabilities of the radio intelligence systems
required to detect and classify these signals, and if applicable group them together correctly
and process them like an authorised receiver.
MEDAV specialises in the development of systems that enable unauthorised participants
(gatherers) to acquire and process communications of this type.
Modular i ty and standardisat ion:
The frequently changing demands on radio intelligence systems and constantly and rapidly
changing technology require the hardware and software to be highly flexible and adaptable.
It has to be possible to upgrade and retrofit systems quickly without any serious problems
at a justifiable expense for different missions and to upgrade them in line with technological
advances.
This is ensured through the use of commercially available standard computer technology, a
high degree of hardware and software modularisation and through the use of standard
software modules and software interfaces (e.g. CORBA).
High-capaci ty comm unicat ions means:
The number and locations of the sensors (antennas and detection systems) should be
selected in accordance with the special features of the targeted radio services frequency
ranges used, range and directional characteristics of the emissions, physical distribution of
the emitters in question etc. and the basic operating parameters. Regardless of whether
they are manned or unmanned, suitable, high-capacity communications means should be
provided for the command and control of these sensors and the transmission of all the
results obtained to the responsible organisational unit for further processing and analysis.
7/24/2019 D Thoelke Buchw713od0e1
13/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 13/58
Suitable analyt ical tools :
Radio intelligence and other sources generally provide very different types of raw material
to be sent for analysis. The increasing use of encryption in modern radio services usually
makes it impossible to identify the content of these radio communications.
Nevertheless, if equipped with suitable (software) tools and methods, an experienced
analyst can obtain a large amount of mission-relevant information on the enemy from
intelligence on the technical details of the radio communications. To do this, analysts must
be in possession of suitable and up-to-date target knowledge and analytical procedures
specific for the task in question. Such capabilities can automatically select the
raw/operational data collected, correlate them with corresponding data from the target
knowledge and supply the analysts with the intermediate results and indications required for
their analyses and situation reports. In special cases, automatic processing can also supply
important triggers for urgent reports/warnings.
In many cases, analysts are even able to determine the content of the radio
communications in the mission. Once again, suitable tools can assist and take the strain off
analysts in their routine tasks thematic screening of the material, translation, provision of
suitable target knowledge and information from other sources, report generation, etc.
Details of information processing (analysis) are given in Chapter 2.4.2.
Personnel:
The second important basic requirement for successful and efficient radio intelligence is the
training and provision of sufficient personnel able to meet the high standards relating to diverse
specialist qualifications and with the necessary experience for the tasks assigned to them.
Modern radio intelligence gatherers are required to satisfy the following requirements profile:
As far as the collection (acquisition) and processing of intelligence is concerned, it is only
possible to gain the required detailed knowledge of the communications behaviour of the
specific target group after many years of experience. Information/knowledge of this kind is
a decisive precondition for effective mission control and the reliable interpretation or
analysis of the results of the acquisition.
The rapid technological changes in radio intelligence technology have resulted in a
significant change in the specialist technical requirements profile for the personnel
responsible for acquisition and analysis. It is now much more demanding and much more
complex. While previously their tasks and capabilities focused on the professional handling
of a series of manually operated search and drop receivers, reliable classification of a
signal using the gatherers eyes, ears and analysis experience etc, nowadays personnel
must also have a high degree of IT know-how and skills.
7/24/2019 D Thoelke Buchw713od0e1
14/58
Company Confidential Principles of Radio Intelligence
Page 14/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
In addition to their traditional functions, the operators of modern radio intelligence systems
will in future also have to configure and, to a limited degree, manage extremely complex,
networked computer technology and software structures for an extremely wide range of
operational scenarios.
The operators, in particular the gatherers, have to understand the extensively automatedoperational sequences in the system (workflow) and be able to interpret the results of the
individual functions correctly and, if necessary, correct them.
The main workhorse used by gatherers and analysts today is the PC, which is used to
control numerous virtual devices, tools and functional sequences.
Gatherers are now primarily concerned with the monitoring and control of the extensively
automated search and acquisition/processing systems. The actual tasks involved in the
gathering of intelligence detection, segmentation, classification and processing of the
signals are performed automatically by the system. However, gatherers/operators must
also be able to investigate on site all signals/transmission modes that the automatic radio
intelligence system is unable to classify and/or process (demodulate and decode) with the
analytical tools available. The aim of this important and demanding task is to determine the
parameters required for automatic further processing and transfer them to the system. If
this is not possible, the signals are recorded with the analytical results achieved and
submitted to an extensive external investigation in a central analytical unit (see also
Chapter 2.4.1.3).
7/24/2019 D Thoelke Buchw713od0e1
15/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 15/58
2.3. Structure
The basic task of radio intelligence the detection, acquisition and processing of communications
relevant to the mission in all the radio services and frequency ranges used by the enemy also
defines its structure.
Although it is true that the different services and frequency bands determine the procedure,
technology and tools required for the reconnaissance mission in question, the functional
sequences, that is the structure,of radio intelligence are in principle the same.
Figure 2 (page 16) provides a rough overview of this structure and shows the interrelationships and
interdependencies of the main functional areas.
The following is a short introduction to these areas. A more detailed description may be found in
subsequent chapters:
The missiondescribes the intelligence interest of ones own command and control with its
specific objectives and points of emphasis.
From this, mission control derives the individual measures/missions required to carry out
the mission and forwards them to the organisational units responsible Intelligence
Gathering (IG), Intelligence Processing (IP) and the central reporting department assigned
to mission control.
Mission control monitors performance of the mission and results and, if necessary for the
task in question, assigns supplementary missions to the above-listed organisational units.
Intelligence Gathering is the sensor area of radio intelligence. With the aid of suitable
acquisition and direction-finding technology adapted to the reconnaissance mission in
question, and taking into account the different operational procedures adapted for the
particular terms of reference, IG searches for radio communications relevant to the mission.
If possible IG determines their bearings (or at least provides a rough assessment of the
direction by means of a directional receive antenna) and classifies and acquires the radio
communications (including demodulation and decoding if required). The results are
forwarded/reported in a form suitable for computer processing and analysis. Technical
analysis (TA) is an important special task for Intelligence Gathering. Signals that are
potentially important for the mission, which the acquisition system is unable to classify or
process, are investigated using suitable analytical tools. The object of on site signal
analysis is to identify the reasons for these system malfunctions as soon as possible after
their occurrence and facilitate the processing of signals of this kind by making suitable
modifications to the configuration of the system modules affected. If these attempts are
unsuccessful, the signals are stored and analysed in greater detail in a central analytical
unit by signals specialists with more powerful tools
7/24/2019 D Thoelke Buchw713od0e1
16/58
Company Confidential Principles of Radio Intelligence
Page 16/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
Figure 2: Overview of radio intel l igence
Intelligence Processing with its analysis of the raw reports provided by the intelligence
gathering service and other accessible sources is the analytical area of COMINT/radio
intelligence. Usually, this unit also processes reports from the other COMINT units and
analyses them jointly.
The raw/acquired reports prepared by Intelligence Gathering could contain information on
the signalling techniques and/or operational parameters and/or the content of the radio
communications acquired. However, even without any knowledge of the contents of theradio messages, it is also often possible to obtain important information on the enemy in
question from the operational sequences and relationships with the aid of suitable target
knowledge. In certain cases, special features of the signalling techniques used in the radio
communications can provide important information on the activity of the intelligence targets.
7/24/2019 D Thoelke Buchw713od0e1
17/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 17/58
Ideally, these results are supplemented by detailed knowledge of the enemys plans and
activities if the radio intelligence has been able to obtain direct access to the content of the
transmitted messages (clear text, content of conversations) or if similar results have been
obtained from other sources.
The results of intelligence processing are:
reports with the information obtained on the targeted enemy (individual reports,
group reports, daily reports, etc.)
contributions to situation reports
if required, also contributions to analyses or forecasts of the enemys capabilities
and plans
The messages and reports are usually composed and structured (formatted) in a form
suitable for further processing by computer.
All messages and reports are notified or forwarded to the central reporting section.
The precondition for reliable and efficient analysis is the availability of up-to-date, verified
and comprehensive target knowledge. This must provide as complete and up-to-date a
picture as possible of the targeted enemy with radio intelligence focusing on the enemys
communication behaviour.
7/24/2019 D Thoelke Buchw713od0e1
18/58
Company Confidential Principles of Radio Intelligence
Page 18/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
2.4. Tasks/functions
2.4.1. Intelligence Gathering
Intelligence Gathering incorporates the following functional units:
Acquisition control
Search
Processing with compilation of the acquisition/raw reports
Technical analysis,
These are described in more detail below (see also Figure 3).
Figure 3: Overview o f IG
7/24/2019 D Thoelke Buchw713od0e1
19/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 19/58
2.4.1.1. Acquisition Control
The reconnaissance mission usually comprises a basic mission derived from the long-term national
security policy and numerous individual missions with specifically targeted subjects or time slots,
determined by current events and developments affecting national interests and ones security
situation. Acquisition Control is then responsible, taking into account the specified priorities, for
defining the (acquisition) missions for the suitable acquisition systems or workstations in
Intelligence Gathering.
Missions of this type are usually valid for one shift of duty or one day, but they may extend for
longer periods. Acquisition Control provides all available and necessary documents for the
performance of the acquisition missions.
These documents are mission-related extracts from the target knowledge and supplementary
databases maintained by IG. They contain all previous communications-related knowledge on the
intelligence target and further helpful data for the configuration of the acquisition systems and the
evaluation of the results of the acquisition.
Acquisition Control is also tasked with monitoring the mission performance and, if required,
correcting or following up the work of individual functional units. To perform this task it has, in
principle, direct (control) access to all important functional units or workstations involved in
searching and processing.
2.4.1.2. Search
Searching for radio communications relevant to the mission is one of the most important and
demanding tasks of radio intelligence. The productive radio communications relative to the
reconnaissance mission can only provide the required information if they are detected, classified
and processed by the system. Therefore, success and effectiveness are primarily measured
against the probability of acquisition of signals/communications relevant to the mission.
With the large number of active emitters and frequencies/channels, the chance of the radio
communications being found and acquired in time (in particular modern digital transmission
modes, which have to be acquired from the start of the transmission, including the preamble with
the synchronisation or the protocol chat)is primarily dependent upon:
prior knowledge and
the technical capabilities of the search systems/components
7/24/2019 D Thoelke Buchw713od0e1
20/58
Company Confidential Principles of Radio Intelligence
Page 20/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
Prior knowledgeincludes all information on the communications facilities of the selected targets
and their communications habits, such as the main frequencies and modes used, the structures of
the communications relationships and radio networks, their preferred transmission times, call
names/call signs, etc.
Information of this kind is part of the target knowledge and is used for the (pre-) configuration of thesearch systems in a way most likely to achieve success.
Ones own technical capabilitiesare dependent upon:
the degree of automation of the search system. A high degree of automation permits
continuous operation and a sufficient acquisition/classification capacity.
the wideband capability of the (automatic) search systems. Preferably, they should be able
to cover all the frequency ranges used by the targeted radio services. However, by using
suitable scanning modes, comparable results can be obtained with automated search
systems with bandwidths covering only part of the spectrum to be monitored.
the ability of the (automatic) search systems to efficiently reduce the amount of work/data
required for searching and classification. The exclusion at an early stage of detected
signals from further processing by taking into account/correlating the directional information
(obtained by means of directionally selective receive antennas or direction-finding) and
location-finding results (ideal case) or features of signals that are already available as the
result of the detection with the corresponding data/specifications available from the
prior/target knowledge, drastically reduces the number of signals that have to be subjected
to a time-consuming computer classification process in the automated search systems (for
details see Chapter 2.4.1.5).
the ability of the (automated) search systems to classify all signals/modes relevant to the
mission even in the event of a high signal volume.
the capabilities and capacities of the automated search systems to temporarily store the
frequency ranges (time signal) to be processed. In each case this must be done completely
and for a sufficient length of time for the required signal processing (detection,
classification) and for the processing to be applied to the search results (demodulation, if
necessary, decoding). In some circumstances also for any post-processing of the signals
that may be required.
In strategic HF intelligence, it is possible to intermediately store the entire band with a
storage depth of several hours. MEDAV offers according systems.
7/24/2019 D Thoelke Buchw713od0e1
21/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 21/58
In higher frequency ranges (VHF, UHF and above), it is generally no longer possible to
store the entire spectrum to be covered. Here, suitable strategies have to be employed to
enable continuous classification and parallel processing of the greatest possible number of
signals relevant to the mission.
Radio services in the VHF/UHF range and above usually make use of wide areas of thefrequency spectrum. Unlike the HF band, at present it is not possible to completely digitise
and store the frequency ranges used by these services. In this case, it is the receiver
resources and procedure used during the search that determine the chances of detecting
and being able to classify as many radio communications relevant to the mission as
possible. The following approach is one example from the large number of possible search
and acquisition strategies of how, despite the large number of frequency ranges to be
covered, it is still possible to guarantee a high probability of acquisition.
Rapidly scanning wideband receivers search the assigned frequency ranges with a high
speed and detect, measure and segment all detectable signals. If the bandwidth and (if
appropriate) result of segmentation features correspond to the search profile, downstream
wideband receivers record them for a sufficient amount of time for classification. Due to the
limited (propagation) ranges of the radio signals at the location of the reconnaissance
receivers, the signal scenario is generally very clear in these frequency ranges. The
majority of the signals detected may therefore be put into intermediate storage by the
slower downstream wideband receivers in the length required for classification,
notwithstanding the time required for the recording. All signals classified as relevant to the
mission can be sent for processing usually processing chains with traditional drop
receivers.
In the tactical area of military radio intelligence (COMMS ESM), the result of the
classification in conjunction with the directional information frequently triggers a warning
message to the responsible (affected) military commander (see also Chapter 2.5).
The functional process is on principle as follows (see also Figure 4).
7/24/2019 D Thoelke Buchw713od0e1
22/58
Company Confidential Principles of Radio Intelligence
Page 22/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
Figure 4: IG - searchin g
The automated search system receives its search missions with the documents required
for performance.
The automated system detects all emissions in the targeted frequency ranges above
specified threshold levels.
The subsequent spectral signal measurement provides the centre frequencies,
bandwidths and the signal/receive levels.
It is practical to perform the segmentationat this point i.e. the identification of grouped
spectral ranges in the time and frequency domain.
Taking into account the available directional information/direction-finding results (or even
better the locating results), if the search missions contain suitable directional or location
specifications, it is possible to exclude all signals that do not conform to this mission profile
from further processing at an early stage. However, intermediate storage or suitable search
systems/strategies facilitate the classification of all detected signals even without this
direction filter. However, this significantly increases the required computing power and
classification time. It may be assumed that if there is no direction selection, the number of
incorrectly classified signals will rise and this in turn will increase the time required for
checking and post-processing.
7/24/2019 D Thoelke Buchw713od0e1
23/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 23/58
If the signal parameters and features are available from detection and segmentation, all
signals that do not conform to the parameter/feature profile specified in the search
mission can also be excluded from the further processing in a further reduction step.
This option is also available during the further classification process.
All detections conforming to the mission profile are sent for signal classification
(determination of the type of modulation or the transmission mode). The initial findings and
indications have already been provided by detection and segmentation.
However, traditional interactive analytical procedures are not suitable for automatic
classification processes. A much more promising method is a mode forecastderived from
the available prior knowledge (in 70% of all previous cases, the enemy always used mode
xyz) and from the parameters/features obtained during detection and segmentation.
These forecasts are used as the basis for switching suitable demodulators to the signals in
question in the expectation that one of them will provide a positive result.
In the military field, this procedure makes use of tactical radio intelligence (COMMS ESM).
As a rule, only signals with specific (known) signal features are sought and processed.
If a suitable demodulator is found, the signal is generally demodulated in order to perform
automatic mode classification on the basis of the symbol stream. This uses similar
strategies to those used for automatic signal classification.
If the transmission mode/type of modulation including the encoding procedure is uniquely
defined, the signal is transferred, together with the signal and mode parameters required for
the processing, via IG/Acquisition Control to Acquisition/Processing in a pre-specified
message format.
One constant and important task of the search (and hence also processing) is the provision of
information for supplementing and updating the target knowledge. To do so, it is necessary to
systematically survey (using reconnaissance technology) important target areas or target groups
for details of the communications structures and communication behaviour, the type of
communications facilities (supplementary) used and whether any changes to the facilities,
structures and operational principles have been identified (updating). The information obtained is
reported to the analytical unit where it is incorporated in the target knowledge.
However, the search process may also be tasked with identifying possible new targets/target areas
(e.g. in the case of the development of new crisis regions or potential conflicts) in order to provide
suitable target knowledge for future reconnaissance missions. This saves preparation time and
increases the ability of ones radio intelligence forces to make a cold start in the event of possible
future missions to cover these targets.
7/24/2019 D Thoelke Buchw713od0e1
24/58
Company Confidential Principles of Radio Intelligence
Page 24/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
In strategic radio intelligence (HF) at least, the wideband capability of the automated search
systems means that there is no longer any need for sophisticated search strategies, such as the
case for example when searching with a limited number of narrowband search receivers. The
frequency ranges to be monitored are virtually contiguous and may be searched for without
interruption by automatic systems. However, this places high requirements on the automatic
classification, signal processing and memory capacity to ensure that even high signal volumes can
be processed (i.e. classified) automatically, with sufficient reliability/quality (high hit rate and low
error rate) and reported with the required signal/procedural parameters for setting the parameters
of the processing components.
In tactical radio intelligence in higher frequency ranges (> 30 MHz) however, it is highly probable
that suitable search strategies will be required in order to be able to detect, classify and process
the highest possible proportion of signals relevant to the mission (see the information on page 24
and 25).
However, wideband search technology does not necessarily exclude the possibility of using
traditional, narrowband search receivers - it may be expedient to use them to supplement
wideband automated search systems:
in order to close frequency gaps with expected low signal volumes for which no wideband
resources are available
or to search for radio communications important to the mission from regions on the
boundaries of the reception technology (in individual cases, the receive level may be too
low for fault-free signal processing in a wideband automatic system, but not for an optimally
tuned narrowband receiver).
2.4.1.3. Technical Analysis
During searching, signals are frequently detected with techniques and operational parameters that
suggest that they may be extremely relevant to the mission, but which the classifier is unable to
identify, or identify sufficiently reliably, and hence cannot be processed. Signals of this kind are
forwarded with a corresponding analysis mission to Technical Analysis (TA) where they are
investigated and the reasons for the failed/faulty classification determined. The complete signals
are stored in their original form (time signal) for as long as required and can, after successful
analysis and suitable parameterisation in the processing system, be subsequently processed
without signal loss using the results of the analysis.
Technical analysis is an indispensable component of all COMINT systems and hence of all radio
intelligence systems. The integrated high-capacity measuring and analytical tools can be used
(interactively) by suitable personnel to investigate/analyse the aforementioned signals and also
unknown signals using the methods of signal and mode analysis. The task and objective of
7/24/2019 D Thoelke Buchw713od0e1
25/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 25/58
technical analysis is, on the one hand, to determine the necessary signal and mode parameters for
fault-free processing in the case of (in principle) known signals. These results are used for follow-
up control and the assignment of new parameters for the processing components. On the other
hand, in the case of unknown signals, TA is used to precisely determine all the signal features
required for the development of suitable procedures to automatically classify and process these
radio communications.
In addition, experienced gatherers can use technical analytical tools to survey the signal scenarios
in frequency ranges that are potentially relevant to the mission and search for new/unknown
signals that appear to conform to the mission profile from the features identified (free searching at
the search and measuring station).
Another important task for TA personnelusually experienced and specially trained gatherersis
the comparative investigation and classification of individual signals/radio communications
processed by automatic systems, in particular in cases where there is cause to doubt the reliability
of the results. Such comparisons are used to check the automatic search and processing
components and to monitor their efficiency and reliability. Since, in strategic HF intelligence, all
signals are available for hours in the ring-memory; this checking can be performed without
problems and with no time pressure. In higher frequency ranges, it is necessary to record signal
samples of a sufficient length for purposes of analysis.
In the event of systematic deviations, analytical tools can be used to determine the reasons and to
reset the parameters and follow-up the system components in question as appropriate.
Recorded signals that cannot be analysed successfully with the measuring and analytical tools at
the TA workstation (search and measuring station) are forwarded to a central, better equipped and
more scientifically orientated analytical unit where they are investigated in more detail using more
specialised analytical tools/procedures.
The objective of this technical scientific analysis is to determine all the signal and mode features
required to develop suitable procedures to automatically search for and process these signals.
When using wideband technology for searching and processing, the recording and analytical toolsshould also have a wideband capability.
7/24/2019 D Thoelke Buchw713od0e1
26/58
Company Confidential Principles of Radio Intelligence
Page 26/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
2.4.1.4. Acquisition/Processing
The task of Processing (from the point of view of signal and mode technology) is the correct
processing of all the signals/radio communications identified by the search classification process
as relevant to the mission. The objective of this processingusually demodulation and, if required,
decoding, in special cases the identification of additionally required signal and operational
parametersis to obtain all accessible information/contents significant for analysis/evaluation from
the intercepted radio communications.
In principle, Acquisition/Processing with its numerous (individual) reports only supplies a multitude
of tiny fragments of signal-specific information regarding the radio operations and/or contents. Only
the sum total of the individual reportssupplemented by additional information from other sources
enables the subsequent analysis/evaluation to derive a sufficiently precise and reliable picture of
the strategic relationships, backgrounds and sequences of the intercepted radio communications
from the extensive pieces of partial information.
Functional sequence: (see also Figure 5 on page 27)
The individual acquisition/processing tasks are derived directly from the search result
reports with the parameters derived from detection, segmentation and classification.
IG/Acquisition Control automatically generates the tasks for the numerous processing
channels and controls the allocation of resources. With each individual task, all the settings
required for correct parameterisation of the individual components in the processing chain
in question are provided.
Although acquisition/processing is largely automatic, operators/gatherers do have the
option of intervening in the automatic sequence via their workstation using an MMI tailor-
made for these tasks (suitable screen masks permitting all required checking and control
functions) for purposes of control or correction.
Depending upon the specifications of the mission management, the wideband (usually in
the HF range) or narrowband (exceptionally in the HF range with special signal/receive
ratios and usually in frequencies higher than HF) receiver resources are controlled with
the required processing components on the basis of the above-listed parameters/settings
and switched to the relevant signals. In special cases (known frequencies and transmission
modes; high priority for complete acquisition) wideband or narrowband processing
resources may also be permanently preconfigured to such radio
communications/frequencies (cast-ironmission).
7/24/2019 D Thoelke Buchw713od0e1
27/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 27/58
Figure 5. IG - Acq uisi t ion /Proces sing
In HF intelligence one decisive advantage of wideband technology, even for processing, is
that all signals in the wideband time signal are stored for a suitably long time. This enables
the processing chains implemented in the wideband chain to be applied to the start of the
targeted signals regardless of the time required for the preliminary classification and
assignment, in each case without signal loss and with complete processing. Technology of
this type can be used to avoid the problematic and undesirable signal losses that occur with
modern digital transmission modes with their preambles, using traditional, narrowband
radio intelligence systems.
Due to the large amount of memory required, this procedure can only be carried out to a
limited extent (if at all) above the HF range.
With the processing task in question, System Control provides each processing channel
with the resources/system components required for complete processing.
With traditional, narrowband technology, an available drop receiver is generally locked
onto the targeted signal by means of an antenna matrix. The required demodulator is either
already integrated in the receiver or located downstream from the IF output. The other
components are used for the further processing of the demodulated signals and divided
according to the type of signal and mode into recording, audio, decoder, modem
components, etc. They are frequently hardwired as hardware components. In the case of
modern computer-based systems, the components are generally implemented as freely
switchable software modules.
7/24/2019 D Thoelke Buchw713od0e1
28/58
Company Confidential Principles of Radio Intelligence
Page 28/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
Modern wideband HF search and processing systems such as those developed and
marketed by MEDAV no longer recognise the clear distinction between search and
processing components. The wideband tuner digitised signals are recorded continuously for
several hours in high-capacity ring memories and are available to all search procedures
(detection, segmentation and classification) and processing procedures (demodulation,
decoding) and, if required, signal analysis (technical analysis) without signal losses.
In the case of analogue (non-encoded) procedures (usually voice communications), the
symbol stream of the demodulated signals is sent directly for audio processing. In the
simplest case, this is a recording module that sends the content to a translator familiar with
the language in question with the required time delay. In addition to the voice/non-voice
identification, tried and tested modern language recognition facilities developed by MEDAV
can also identify the language being used. This facilitates the automatic assignment of
voice recordings to the correct translator in each case. Other high-capacity tools such as
topic spotting, word spotting and speaker identification are now available.
Digitally encoded signals/procedures are sent to suitable decoders in accordance with the
specifications for their classification - these may be closely coupled to the associated
demodulators especially with modern modes. The results (usually voice, data or ASCII text)
are now available for report preparation.
The provision of direction-finding/location-finding results on, if possible, all the radio
communications acquired and processed is also an important element of processing, atleast for signals where the sender cannot be uniquely identified. The direction-
finding/location-finding results in conjunction with the prior knowledge/ target knowledge are
therefore also used for the identification of the acquired emitters (for details, see Chapter
2.4.1.5).
The information obtained from the results of the search, direction-finding/location-finding,
signal classification and processing like the technical parameters for the signal acquired,
the encoding procedure used, the operational parameters obtained from the analysed and
identified operational sequences and relationships and ideally the content of the messages
in code or clear text are inserted in computer report forms as well as attached as annexes
by the gatherer, but also increasingly automatically. The data are sent as acquisition/raw
reports via the data links provided to the evaluation unit (IP), and in special cases
(warnings/urgent reports) also immediately to the responsible units.
7/24/2019 D Thoelke Buchw713od0e1
29/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 29/58
In principle, gatherers have the same analytical tools for processing as for searching. They
can use these tools at their leisure and with a time delay to investigate all signals that
cannot be processed or cannot be processed with sufficient quality despite the fact that
they have been classified successfully. If the analysis was able to identify the causes of the
malfunctions and it is possible to successfully re-set the parameters of the
function/processing modules, the signal can be re-extracted from the memory and
completely reprocessed.
In military strategic radio intelligence, processing is performed according to the sequences listed
above. However, the tactical discipline COMMS ESM differs in its priorities and in parts of the
signal processing. Here, the detection and classification of a specific signal is in many cases
adequate for a (warning) report or for the initiation of countermeasures.
Current and reliable indications of an acute threat can only be obtained from specific procedural
and operational features or sequences and from voice communications. The same applies to a
limited extent to encrypted radio communications.
Depending upon the nature and scope of the indicators required for the identification of a current
threat, the signals are further processed individually in the processing unit. They are demodulated
and, if required, decoded (digital modes) and analysed with regard to the above-mentioned
indicators. This is generally performed automatically, but in individual cases, an experienced
operator will have to evaluate/analyse the intercepted radio communications (for example, in the
case of radio voice communications). This situation similarly applies to tactical radio intelligence foridentifying or updating the tactical scenario (that is without any acute threat).
2.4.1.5. Significance of direction-finding/location-finding for searching,identification and evaluation
The introduction of wideband technology for searching has increased the number of detected
emissions several-fold compared to the use of a limited number of narrowband search receivers in
traditional search systems. In particular with short-wave radio (HF), when wideband search heads
are used, the number of detections is usually so high that sometimes it is not possible to
automatically classify all the signals received with the computer power available, unless suitable
strategies to relieve the situation, i.e. to reduce the number of emissions, are taken. One of the
most important approaches to searching is to minimise the number of signals to be forwarded for
time-consuming computer classification. Minimisation is achieved by means of suitable
exclusion/filter criteria (in steps) at the earliest possible stage of processing. Ideally, all that
remains should be signals with a high relevance to the mission.
7/24/2019 D Thoelke Buchw713od0e1
30/58
Company Confidential Principles of Radio Intelligence
Page 30/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
The only way to achieve a reduction of this kind is to supply the known signal features, operational
sequences/features and other information useful for classification when the search missions are
assigned. These may be parameters such as (transmission) time, direction or location, frequency,
bandwidth etc. When the relevant features/parameters are identified by the system, these selection
or exclusion criteria lead, in different stages of the signal processing during the search, to the
exclusion of all signals that do not conform to the specified features.
In particular, the early correlation of the directional information for the individual emissions detected
with the specified directional data effectively reduces the number of signals requiring further
processing during the classification process.
Approximate directional information can be obtained using directionally selective receive antennas
(LP antennas or circular array antennas). More precise determinations of direction- and location-
finding can only be achieved with suitable direction-finding systems/bases.
In addition to reducing the data/effort during searching, the reliable identification of the targeted
emitters/radio stations with the aid of the direction-finding/location-finding results is of great
importance for processing (IG) and analysis (IP).
High-capacity direction-finding and location-finding systems are, consequently, indispensable
components of all radio intelligence systems, regardless of whether they are implemented in
narrowband, wideband or mixed technology. However, because of their high signal volume,
wideband searching and processing components also require direction-finding/location-finding
systems that are adapted to the capacity and bandwidths.
The only exceptions to this rule are radio intelligence systems for very specific tasks/operations in
which the limited spectrum of tasks or operations does not require or permit direction-
finding/location-finding.
Suitable procedures in direction-finding systems signal assignment/comparison by means of a
comparison of parametersmust ensure that the direction-finding/ location-finding results can also
be correctly assigned to the signals acquired and processed by the search/processing system.
Any location-finding results available are always a component of the acquisition reports. They
assist the analysts not only in the identification/confirmation of the emitters/radio stations and
hence of the users or organisations, but also they make it possible to determine the location/area
of the units and people targeted.
7/24/2019 D Thoelke Buchw713od0e1
31/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 31/58
2.5. Intelligence processing and target knowledge
2.5.1. Overview
Radio intelligence is only oneimportant cornerstone of communications intelligence (COMINT).
All COMINT units, and hence numerous extremely different sources supply the results of their
acquisition/processing to central Intelligence Processing (IP), frequently also referred to as
COMINT analysis. These are transmitted as formatted reports due to the different sources,
usually also in different formats on the available communications links in as near real-time as
possible and stored in IP for further processing. The form of further processing, the scope of
automated and partially automated processing steps, is determined on the one hand by the
quantity and type of the reports and the ratio between operational and content-related
results/information and on the other by the configuration of the computer-based processing and
analytical tools in the IP organisation.
Due to its special function as an early warning system, tactical radio intelligence (COMMS ESM)
does not undergo the analysis process described in this chapter. Chapter 2.5 deals with its special
features.
In principle, the following functional or processing sequence has proven to be expedient: (see also
Figure 6 on page 39)
In report pre-processing, incoming data/reports of the most diverse types and formatting
are automatically recorded and stored in their original form (long-term) so they can be
suitably prepared for further processing later.
In the preliminary analysis,as the first (usually automatic) analysis/ evaluation step, the
thematic assignment and therefore thematically correct storage is determined from
operational data/information and content in the reports. This ensures that the reports are
provided appropriately for the respective tasks or distributed to the responsible analytical
areas/analysts in each case.
In addition, report material from all sources is pooled according to subject/task area and
supplemented by any further information belong to the same subject area (added value).
The reports prepared in this way and supplemented by additional information/knowledge
are available to the operators/analysts in the incoming report areas assigned to them for
processing and evaluation => analysis.
7/24/2019 D Thoelke Buchw713od0e1
32/58
Company Confidential Principles of Radio Intelligence
Page 32/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
In principle, analysts can use their (prior) knowledge of and experience with the intelligence
targets assigned to them together with the operational information and possibly even the
content of the supplemented reports supplied to them to identify the activities and hence
frequently also the plans of their intelligence targets and evaluate them correctly. The
evaluation of the events and their sequence enables analysts to obtain important
information or knowledge for the assessment of the situation, to assess the potential risk
with sufficient reliability and if necessary issue the necessary indications for suitable
(counter) measures.
Analysts use the information and findings obtained from the analysis process to produce
individual reportsand situation reports according to the type of information, if required
including analyses for their customers.
Figure 6: An overv iew of IP
If the information on the reconnaissance targets in question is confirmed with sufficient
certainty (long-term observation; evaluation of all sources), it is used to update and
supplement the target knowledge.
Another important task of analysis is fine-tuning the intelligence gathering if there are gaps
in raw reports or individual mission areas require consolidation/augmentation.
7/24/2019 D Thoelke Buchw713od0e1
33/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 33/58
2.5.2. Report pre-processing
The total number of reports sent to the communications intelligence (COMINT) analytical area (IP)
originates from numerous sources with extremely different volumes. A not insignificant proportion
comes from radio intelligence/acquisition. Therefore, Intelligence Processing is where reports are
brought together from ones COMINT facilities/sources and from all cooperating national and
international partners with the same security interests and reconnaissance targets.
Pre-processing comp r ises the fol lowing proc essing steps: (see also Figure 7)
During storage, as a first processing step, the incoming reports are logged - here they
may be assigned to the sender with details of the time received, the tactical time, the type
of report and the reconnaissance target. Other details are possible.
After logging and storage, the reports are prepared in several steps for the subsequent
evaluation processes according to their nature, origin and type. In high-capacity, modern
evaluation systems, the processing operations are performed automatically. However, the
scope of computerised pre-processing is heavily dependent upon the nature of the reports,
the requirements on the automatic processing and the degree of automation achieved by
Intelligence Processing.
In another step, all reports that do not conform to ones own processing format (mainly
partner reports) are automatically converted to ensure a uniform data format suitable for the
automated evaluation processes.
XML/HTML has been found to be a particular suitable report format, since all known report
formats may be depicted / converted without loss and because XML/HTML provides the
ideal conditions for the use of Internet technologies for data preparation/representation,
transport and provision.
Figu re 7: IPpre-processing
7/24/2019 D Thoelke Buchw713od0e1
34/58
Company Confidential Principles of Radio Intelligence
Page 34/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
In a further processing step to make the handling of the material simpler and easier for the
analyst, the reports should be cleaned of formal ballast that is of no relevance for the
subsequent processing and content analysis/evaluation (peeling).However, the report is
also retained and stored in its original version.
Foreign language report contents in text form can be translated into ones own language by
means of another automatic process. However, the translations usually have to be revised
by suitable foreign language experts. Audio files from voice traffic sometimes also require
translation by personnel with foreign language training.
The reports prepared/pre-processed in this way are now available to Preliminary (Report)
Analysis for the subsequent processing and analysis steps.
2.5.3. Preliminary (Report) Analysis
The following processing sequence describes preliminary analysis: (see also Figure 8 on page 36)
The numerous reports prepared by pre-processingare analysed in another extensively
automated processing step for pre-specified features and content to an extent that enables
the assignment of the individual reports to the predefined subject/mission areas and
hence also to the relevant analysts. This process is dependent in each case on the nature
of the reports and the acquisition results in them in accordance with the formatting
regulations. For example, the content of reports relating to communications/radio
parameters and also messages in reports may contain clues regarding the user/the
organisation and the strategic background of the communications acquired (here: radio
messages).
This ensures the thematic assignment of the reports and their task-specific provision to
the responsible analyst.
This processing step actually corresponds to the first step in a traditional analysis process.
It can and should take place automatically, but the analysis system must provide the
opportunity and tools to enable the analyst responsible to monitor the results or the
assignment process and, if necessary, make corrections.
The thematic assignment creates the conditions for pooling reports belonging to the same
subject/target groups and supplementing them for the analysis by additional knowledge
from the available databases in the sense of added value. This enables analysts to obtain
a more comprehensive/extended picture of their reconnaissance targets and to evaluate
the individual reports more accurately and assign them to the previous results/findings in a
more appropriate way.
7/24/2019 D Thoelke Buchw713od0e1
35/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 35/58
Added valuecan be indicative findings concerning technical and/or operational features of
the radio networks in the mission focus, information relevant to the mission on the target
groups/people, their activities and habits, contacts, relationships, capabilities and potential,
their previously known locations and movement patterns and any other activities/findings
that may be relevant for the analyst in relation to the reconnaissance targets etc. This
information is frequently based on findings from intelligence sources, but can also come
from open sources.
For use in (preliminary) analysis, this information has to be prepared for computer
processing, correctly formatted and stored in such a way that the aforementioned
supplementary processes and targeted search requests are available in their entirety to the
analysts on a topic-related basis.
The reports prepared in this way and supplemented by basic knowledge and up-to-date
findings are called up by the responsible analysts on their workstation computers.
If long-term observations of the radio networks of the targeted enemy identify rules in the
sense of regular behaviour or procedures, these are useful for the target knowledge and
may also be used to derive a description of the enemys normal behaviour in radio
operations. This normal behaviour can generally be described so that automatic processes
are able to identify (from the reports supplied with the large amount of intelligence on the
radio parameters), a standard behaviour or, in the event of deviating radio parameters, a
deviation from the norm. The latter case is an important indicator of special activities onthe part of the observed/detected enemy and will be notified immediately to the responsible
analyst in each caseby the latest at the start of his shift - in a special report.
If the reports contain known indicators enabling direct conclusions to be drawn regarding
the activities of the reconnaissance target, the preliminary analysis will identify these
indicators immediately after receipt of the report even before an analyst has screened the
material.
7/24/2019 D Thoelke Buchw713od0e1
36/58
Company Confidential Principles of Radio Intelligence
Page 36/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
Figure 8: IP prel iminary an alysis
When recognised, these indicators automatically trigger urgent reports or warning
reports according to pre-programmed sequences that are forwarded directly to Monitoring
and Control of ones own COMINT/radio intelligence service usually the Mission Control
and Reporting Unit with its Control Centre (CC) which is constantly on standby and
there put into a format suitable for display that ensures that the shift staff are immediately
made aware of the information.
If the results of ones own radio intelligence contain pre-specified indicators, these should
be identified by the intelligence gathering service immediately during/after acquisition. The
search/test procedures used should in principle conform to those used by the intelligence
processing service and trigger the same immediate action/urgent reports.
7/24/2019 D Thoelke Buchw713od0e1
37/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 37/58
2.5.4. Evaluation of reports and reporting
Analysts can call up from the memory area assigned to their field of responsibility an overview over
all newly arrived reports that have been prepared and supplemented as described above.
Depending on the nature of the reports and the configuration or availability of the analysis and
evaluation tools, analysts can select different material presentation formats. The following lists
some of the numerous forms of presentation:
o Original report text (in the relevant report format with all report elements)
o Prepared/peeled report text with only the report elements relevant for analysis
o Graphical representation of radio networks identified
o Depiction of changes to these radio networks
o Frequency of communications
o Graphical representation of contacts identified (who is communicating with whom)
o Deviations from the normif it is possible to describe normal behaviour following lengthymonitoring phases
o Representation of the communications/radio situation and, if appropriate, also the tacticalsituation
o Temporal correlation of identified and reported activities
o etc.
Experienced analysts can generally use the wide variety of findings provided and supplementary
information (added value) on the assessment of individual processes and their interrelationships
for analytical purposes to obtain a realistic picture of the activities of their reconnaissance targets.
These findings are linked to the results of previous reconnaissance efforts against the same target
and used to draw up a current situation report or update the existing report. The analysts
detailed knowledge of the reconnaissance target, its basic plans, objectives and procedures,
potential and capabilities, previous behaviour etc. enable them to produce a reliable assessment
of the situation and in individual cases also contribute important information/indicators for suitable
(counter) measures.
The results of the analysis are summarised in reports that relate primarily to individual or
associated subjects/processes. In the event of long-term observation/ reconnaissance, when
required or on request, analysts combine a large number of messages and findings to produce
situation reports and analyses. In addition to the identified procedures, these usually contain
assessments and forecasts regarding the enemys potential and plans and other relevant
comments on the reconnaissance target. The analysts reports provide important contributions to
the final reports summarising of the central analysis by the reconnaissance/intelligence service in
question.
7/24/2019 D Thoelke Buchw713od0e1
38/58
Company Confidential Principles of Radio Intelligence
Page 38/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
Figure 9: Analys is and repor t ing
Intelligence operators have a variety of tools for the production of reports, which provide templates
(standard form), relieve them of the task of making formal or routine entries, incorporate extracts
from reports and support and integrate maps and graphics, etc.
Intelligence Processing usually has a permanently manned monitoring and standby service (control
centre => CC). The CC has access to all incoming reports and monitors all outgoing reports. Its
tasks include preparing daily summary reports providing an overview of the COMINT/radio
intelligence situation (changes) and of any events/findings during the last 24 hours worthy of
reporting.
At the start of each days shift, the CC issues an up-to-date situation report on the COMINT/radio
intelligence situation with the identified communications/radio activities and the changes to the
reconnaissance targets and reports on the special events during the previous night/shift.
The CC ensures that time-critical reports (e.g. urgent reports) are forwarded immediately to the
specified addresses and, if required, the specified alert measures triggered.
However, in larger COMINT organisations, the CC may also be integrated in a higher-ranking
central control area in the organisational unit Mission Control and Reporting which, as a
central COMINT command and control body is also responsible for monitoring and pooling allreports issued and for mission control as far as intelligence gathering and intelligence processing is
concerned (see also Figure 9).
7/24/2019 D Thoelke Buchw713od0e1
39/58
Principles of Radio Intelligence Company Confidential
w713od.0e1 MEDAV GmbH 2013Specification subject to change Page 39/58
2.5.5. Processing target knowledge
Target knowledge includes all information on a reconnaissance target (this could be individuals,
groups, criminal organisations, armed civilian or paramilitary/military units and organisations,
enemy services etc.) which is necessary or useful for finding and acquiring the communications
links (here: radio communications) of the target/enemy at justifiable expense and to process and
analyse them so that the components of the traffic relevant to the intelligence services may be
extracted and interpreted correctly.
Target knowledge may be divided into three main groups:
a. Information on the communications equipment used by the enemy and on the operational
sequences of its communications. This may be information obtained by radio intelligence
on the enemys radio devices/systems, frequency plans and frequency usage (history), the
transmission modes used, call names, signs or numbers used, its radio networks, itstechnical and operational radio operations and sequences, etc.
b. Confirmed information obtained on the targeted individuals, groups, organisations, units.
This could include personal data on target persons, information on organisational and
command and control structures, locations, deployment, equipment, capabilities and habits,
command and control principles and sequences, command structures, etc.
c. Technical and/or operational features of the radio communications, allowing reliable
conclusions regarding strategic backgrounds/measures. This target knowledge forms in
particular the basis for tactical radio intelligence (COMMS ESM).
The above-listed examples are only a limited selection of the numerous possible types of target
knowledge. The communications facilities, sequences, habits and features, the properties
important for the analysis and the handling sequences differ according to the nature of the
reconnaissance target. This leads to a multiplicity of extremely different individual types of target
knowledge required for successful reconnaissance on the targets in question. Therefore, every
target places very specific requirements on COMINT/radio intelligence and on the target
knowledge to be compiled.
One basic principle is that, in addition to high-capacity and suitable sensor technology, precise,
comprehensive and up-to-date target knowledge is the key to successful reconnaissance on
enemy communications/radio traffic.
7/24/2019 D Thoelke Buchw713od0e1
40/58
Company Confidential Principles of Radio Intelligence
Page 40/58 MEDAV GmbH 2013Specification subject to change w713od.0e1
However, the development of reliable and sufficient target knowledge requires long-term
observation and evaluation of the enemys radio communications with ones own radio intelligence
facilities. The information obtained in this way may be supplemented by assured information from
other sources. Here, it is important that the target knowledge is updated and where possible and
required also supplementeda task which is permanently assigned to each analyst for their field
of responsibility; in larger COMINT organisations, there is frequently also a special target
knowledge group.
New information relevant to the target knowledge can only results in changes or supplements to
the target knowledge database if the operator/analyst responsible for the relevant mission area has
released these reconnaissance results as reliably classified and suitable for the database. This
usually only happens w