Knowledge

Technical intelligence

Source đź“ť

782:, the legislation costs American companies "hundreds of millions of dollars in contracts every year". The USA is particularly upset about the practice engaged in by some countries of not only turning a blind eye to bribery by their own nationals but recognizing these same bribes as tax-deductible business expenses. The Clinton administration has not been encouraged by progress in lobbying fellow OECD members to pass domestic legislation mirroring America's, or to agree to an enforceable international code condemning the practice. In the absence of any international support for these initiatives, American commercial interests have been pressuring their government either to change the international regime or to rescind the legislation. "Unwilling to rescind, the Clinton administration turned to the CIA." 684:
provides direction and money; it also collates the information provided to it by companies. Government agencies, the Ministry for International Trade and Industry (MITI) and the Japanese External Trade Organization (JETRO), coordinate national economic collection priorities, provide access to foreign countries (through trade offices), and channel the intelligence they do collect to the appropriate industry. JETRO operates 77 offices in 59 countries; its agents collect economic and technical information and forward it to MITI. According to Japan: 2000, a report commissioned by the CIA, "Japan's elaborate system for political and economic intelligence is conducted through the various trading companies down to the office level.""
761:) with regard to the economic and commercial interests of the state. According to the Act, under the authority of the Secretary of State, the functions of SIS include obtaining and providing information as well as performing "other tasks" relating to the actions or intentions of "persons outside the British Isles". These functions of SIS, like those of GCHQ, are to be exercised only in the interests of national security, prevention or detection of serious crime and, most importantly from the point of view of this article, "in the interests of the economic well-being of the UK"." 540:
developed under secret contract for the Strategic Defense Initiative (SDI). The CONTAM software tracks the plumes that rockets and missiles leave in their wake and, therefore, has both military and civilian applications. Hoffman sold his wares to Japanese multinationals-Nissan Motor Company, Mitsubishi Electric, Mitsubishi Heavy Industries, and Ishikawajima-Harima Heavy Industries – that wanted the information for civilian aerospace programs. He was arrested in 1992." Porteous identifies two kinds of economic intelligence that are distinct from S&TI:
424:
related to an intelligence agency's lack of knowledge of the subject area and to problems associated with the dissemination of intelligence once acquired. These arguments tend to come from individuals who at the same time argue for or accept the need for government to defend against economic espionage engaged in by other governments. It is difficult to support these points simultaneously: if economic espionage is "tactically useless", it is similarly useless to foreign governments that practice it, and thus need not be defended against.
848:"It is this direct link between government and business that some individuals propose to establish between the U.S.Government and U.S. businesses. Anticipated rewards of such a relationship include: reduced product research and development (R&D) timelines, reduced R&D costs, accelerated time from R&D to product marketing, and the receipt of lucrative contracts by undercutting a competitor using inside knowledge of his bid and terms. In sum, any benefit gained in these areas has the potential to increase profits." 244: 805:"Former United States Central Intelligence Agency director James Woolsey confirmed in Washington... that the US steals economic secrets "with espionage, with communications , with reconnaissance satellites", and that there was now "some increased emphasis" on economic intelligence. He claimed that economic spying was justified because European companies had a "national culture" of bribery and were the "principle offenders from the point of view of paying bribes in major international contracts in the world". 739:, and the State Committee for External Relations completed the list of participants. The bulk of collection was to be done by the KGB and the GRU, with extensive support from the East European intelligence services e.g. in Poland Departament I MSW – Wydział Naukowo-Techniczny. A formidable apparatus was set up for scientific espionage; the scale of this structure testified to its importance. The coming of détente provided access for Line X and opened new avenues for exploitation." 680:"In the early 1980s, the companies Hitachi and Fujitsu, and the government agency the Ministry for International Trade and Industry (MITI) were caught stealing corporate secrets from IBM, Cray, and Fairchild Semiconductors. A 1987 Central Intelligence Agency (CIA) report "concluded that 80 percent of all Japanese government intelligence assets were directed toward the United States and Western Europe and concentrated on acquiring secrets about... technological developments." 428:
success, trying to obtain intelligence on various complex military technologies of which the case officers would not have had a profound knowledge. If intelligence services were trusted to obtain such information, a shift of focus to complex commercial technologies and intelligence would not be unthinkable. The same techniques used to obtain military secrets could be turned to complex commercial technologies or strategies without too much difficulty."
591:
engaging in industrial or economic espionage, may open new debates on when and how intelligence services should intervene in these cases. For while European states move towards privatization (albeit retaining a "golden share") in many cases there is little sign of a lessening of links between business and government in the high growth communitarian societies of Asia. The imminent emergence of powerful Chinese multinationals out of the so-called "
504:
government-sponsored cooperative development programs and various kinds of industrial linkages, including international subcontracting and teaming arrangements, joint ventures, and cross-border mergers and acquisitions. Foreign companies have acquired many U.S. defense companies and have legitimate business interests in them. The U.S. government allows such foreign investment as long as it is consistent with U.S. national security interests."
587:
more attuned to today's geopolitical realities, this dubious status is being transferred to the Japanese and emerging Asian economies. In a recent article in the Far Eastern Economic Review, FBI officials stated 57 countries are running operations to obtain information out of Silicon Valley. These same officials were quoted as labelling Asian governments and multinationals, particularly Japan, Taiwan and South Korea, as the chief culprits."
812:"That's correct", he told a packed audience of foreign press journalists...We have spied on that in the past. I hope... that the United States government continues to spy on bribery." Woolsey continued, "Whether economic or military, most US intelligence data came from open sources, he said. But "five percent is essentially secrets that we steal. We steal secrets with espionage, with communications, with reconnaissance satellites." 456:
area. It has recently been suggested that the embarrassing release of information indicating French intelligence service targeting of American companies, which triggered an American boycott of the Paris Airshow, was the work of disgruntled French firms. The companies responsible for releasing the material to the press apparently were unhappy with what they saw as the tendency of the French intelligence service,
583:
intelligence on the French bargaining position. The Americans argued that this support to government decision-makers was well within the bounds of tolerable espionage behaviour...." The Americans contrasted this with :alleged French intelligence activities in support of French commercial actors through directly transmitting clandestinely obtained proprietary information from American companies was not.
42: 148: 407:
first began systematically tracking foreign technology collection efforts in 1997." By no means, however, is the US the only target, nor are China and Russia the only countries trying to obtain such information. In 2003, Sweden expelled two Russian diplomats over accusations of spying at Ericsson, a major electronics manufacturer whose products include
834:
sources is inadequate. Economic intelligence will play an increasingly important role in helping policy-makers understand economic trends. Economic intelligence can support U.S. trade negotiators and help level the economic playing field by identifying threats to U.S. companies from foreign intelligence services and unfair trading practices.
565:
intelligence support to government decision-makers is generally accepted as a legitimate function of state intelligence services. Related intelligence services that go beyond the mere collection of information and aim to influence events directly, either at a macro-economic or firm level, are understandably more controversial.
692:"South Korea's equivalent of the CIA, the National Security Planning Agency, places operatives in Korean companies like Hyundai, Samsung, and the Lucky Group. The companies then post the agents to foreign countries to forge close contacts with their industrial counterparts to gather technical and financial information." 819:" The principal offenders, from the point of view of paying bribes in major international contracts in the world, are Europe. And indeed, they are some of the very same companies – the companies are in some of the very same countries where the most recent flap has arisen about alleged American industrial espionage." 672:
reconnaissance satellites. "Data the agents removed successfully, before their arrest, went to the laboratories of the Israeli company Electro-Optics Industries. The Government of Israel continues efforts to field a reconnaissance satellite with the services of a prime contractor—Electro-OpticsIndustries."
769:
The United States suffers from a degree of conflict, in that it is sensitive to economic espionage against US companies, but it also objects to those companies using business practices, routine in other countries, that are considered corrupt domestically. "The United States is the only member of the
655:(DGSE), studies Japanese intelligence operations abroad, trying to determine Japan's next technology target. According to de Marenches, Japan examines the global production situation, determines which country can satisfy their high- technology requirement, and then dispatches a collection delegation. 639:
France and the US have accused one another of economic, scientific and technical espionage at the national level. A US senator, William Cohen, accused the French of hiding listening devices on Air France flights in order to pick up useful economic information from business travelers."In 1993, the CIA
423:
Porteous raises a question of the efficiency of commercially oriented, economic, scientific and technical espionage. He observes that some claim intelligence obtained through economic espionage would be "tactically useless" for a number of reasons. Typically, the barriers to potential efficiency are
683:
As of 1994, "Japan operates its economic collection bureaucracy in a manner different from France. The Japanese government itself does not provide large amounts of intelligence to its corporations. Companies maintain their own extensive intelligence gathering assets. Instead, the Japanese government
671:
Several sources describe Israel as having energetic programs in economic and S&TI. According to a Command and General Staff College thesis, Israeli Air Force intelligence tried to steal 14 boxes of corporate data from Recon/Optical, Inc., a company that develops optics and semiconductors used in
598:
It can reasonably be surmised that there is a degree of economic intelligence gathering among most or all industrialized nations. Merely because a country, in the list below, complains of intelligence gathering against it should not be interpreted as meaning that country's intelligence service does
582:
He cites the former category, intending to inform government officials, as where the CIA was allegedly supporting the formulation of American trade policy with regard to negotiations concerning audio-visual matters at the GATT. This was reportedly done through the provision of clandestinely obtained
539:
collected $ 4.6 million for selling classified information, on CIA activities, to the USSR and Russia. In contrast to the sale of government information, "Ronald Hoffman, a project manager for a company called Science Applications, Inc., made $ 750,000 by selling complex software programs that were
406:
According to the US National Counterintelligence Executive (NCIX), 108 countries tried to obtain US technology in fiscal year 2005. Most of the effort, however, centered around a small number of countries. NCIX named China and Russia among this small number, "just as they have since the CI Community
376:
criminalizes two kinds of activity, which may be done either by foreign powers for (18 U.S.C. § 1831–1839) makes the theft or misappropriation of a trade secret a federal crime. To some extent, the act addresses an international problem, but not all countries regard unauthorized technology transfer
138:
used in discussion of disarmament to mean information gathered by various sorts of cameras, sensors, or other devices. Technical intelligence is the product: "technical intelligence—Intelligence derived from the collection, processing, analysis, and exploitation of data and information pertaining to
815:
Explaining his view that Europe was the main centre of world industrial bribery, he asked "Why... have we in the past from time to time targeted foreign corporations and government assistance to them?... Some of our oldest friends and allies have a national culture and a national practice such that
808:
Responding to the European Parliament report on interception capabilities and the Echelon satellite surveillance system, Woolsey said that the "Interception Capabilities 2000" report which had been presented to the parliament's Citizens' Rights Committee on 23 February, was "intellectually honest".
586:
In 1994, Porteous suggested that there may be a shift in the countries most eager to engage in this sort of intelligence gathering. "Early on, the French and the Russians were presented in most North American analyses as the primary practitioners of economic espionage. Now, in a realignment perhaps
484:
Offering support services to facilities or contractors with sensitive information. These can include technical support services such as assembly and testing, but also services as mundane as trash collection, hoping the trash may contain information inadequately shredded or otherwise destroyed. Even
431:
Another efficiency argument deals with the security of dissemination to industry. National characteristics will be different here; industry-government partnerships, for example, are far more routine in Japan than in the United States. US consortia have been open to foreign firms, and many have shut
347:
in the 1960s, reported that the U.S. Army captured a large supply of German mortar ammunition in France during World War II. It was discovered that the German ammunition could be fired from US mortars. Troops in the field prepared a firing table for the American mortar firing German ammunition
816:
bribery is an important part of the way they try to do business in international commerce.... The part of the world that where this culture of getting contracts through bribery, that actually has a great deal of money, and is active in international contracting is to a first approximation Europe".
180:
The production of technical intelligence is a specialized intelligence art used to meet the needs of the armed forces and national intelligence consumers. A multiservice manual describes U.S. military doctrine for TECHINT. The technical intelligence process is divided into three areas—collection,
611:
He speculated, in 1993, "In the near future, it is conceivable that the UK would share more economic intelligence with fellow EC members than it would with Canada or the United States. On the other hand, the USA would be more likely to share its economic intelligence with its fellow FTA and NAFTA
590:
There are differences in economic culture between Europe and Asia. Where European industry-government partnerships tend to be very formally defined, the Asian ones are more fluid. "The prospect of huge Asian multinational corporations, with their definite but elusive relationship with government,
534:
Given that scientific and technical information is an important part of a nation's competitive position in world markets, scientific and technical intelligence blurs into "economic intelligence", which is defined by the U.S. government as "government-sponsored or coordinated intelligence activity
234:
The production of technical intelligence includes preparation of a variety of reports and documents. TECHINT documents include a wide range of materials from brief messages and reports prepared in the field to extensive formal studies prepared by teams of researchers. During World War II the Army
455:
Porteous observed "the existence of means to reduce dissemination difficulties will not erase them. Problems will inevitably arise. Those countries considering engaging in or expanding their practice of economic espionage would be well-advised to consider the alleged experience of France in this
427:
He counters the argument that "lack of direct knowledge of a certain business or its technology has been cited as a significant obstacle to intelligence services engaging in economic espionage. Yet during the Cold War, intelligence services spent significant amounts of time and energy, with some
535:
designed to unlawfully and covertly obtain classified data and/or sensitive policy or proprietary information from a U.S. Government agency or company, potentially having the effect of enhancing a foreign country's economic competitiveness and damaging U.S. economic security." Convicted CIA spy
833:
To adequately forecast dangers to democracy and to U.S. economic well-being, the intelligence community must track political, economic, social and military developments in those parts of the world where U.S. interests are most heavily engaged and where overt collection of information from open
391:
Categorizing an individual act can be complex, as some national intelligence services have provided scientific and technical intelligence to private firms based in their countries. It becomes even more complex when the information is provided to an organization partially or fully owned by that
560:
Nations often claim that each is trying to get economically significant scientific and technical information to file counterclaims of each spying on the other. One conflict comes from the fact that some normal business practices in other countries are considered illegal by the United States.
225:
The exploitation phase includes various types of technical and operational tests. The services have well developed procedures for testing various types of materiel. Testing often includes operating the item and non-destructive testing. The Air Force Historical Studies Office Web contains an
778:— criminalizing the payment of a bribe to a foreign official. The legislation arose out of the American bribery scandals of the 1970s. These restraints, which are extraterritorial in scope, have proven a constant irritant to Americans doing business abroad. According to Secretary of State 564:
Nations have different views of what constitutes offensive and defensive economic intelligence: "Decisions informed by the provision of economic intelligence range from determining whether to raise interest rates to the proper stance to take in contentious trade negotiations. This type of
121:
Technical intelligence is intended primarily to counter technological surprise. Knowledge of the characteristics and capabilities of enemy weapons allows nations to develop effective countermeasures for them. Occasionally, armed forces adopt technology developed by foreign nations. The
503:
Another category starts with agreements of which the hosting government is fully aware, but that may be enforced more or less stringently in specific cases: "Since the mid-1980s, development, production, and marketing of weapon systems has been increasingly internationalized through
650:
France, according to Russell, also is a target. The French former intelligence official, Alexandre de Marenches described the Japanese as experts in economic espionage; that the Japanese government and industry have close ties with each other. The French intelligence agency,
189:
Chance plays an important part in the collection of foreign weapons and equipment. The collection phase typically begins when a soldier finds something interesting on a battlefield or a defecting pilot flies an aircraft to a friendly country. In a famous case,
822:
Woolsey, when newly Director of Central Intelligence in 1993, publicly announced that economic intelligence was now a CIA program. French intelligence had been aggressively going after information from American executives. Woolsey said "No more Mr. Nice Guy."
468:
Perhaps most common are operations that exploit business relationships, including the marketing and sales phase. There are also efforts targeted at individuals with sensitive knowledge. The NCIX said the easiest techniques can be straightforward, including:
796:
to mean espionage for the direct benefit of an industry. ... I don't call it industrial espionage if the United States spies on a European corporation to find out if it is bribing its way to contracts in Asia or Latin America that it can't win honestly.""
473:
Simply asking companies for "classified, sensitive, or export-controlled information. In some cases, a single would-be foreign buyer sent out multiple requests to a variety of US companies, searching for a seller willing to ignore or bend export-licensing
339:
Troops involved in technical intelligence operations have used knowledge of foreign material to put enemy equipment to use. For example, Army troops used German military telephone wire and medical supplies to aid civilians in France during World War II.
392:
government, and that organization competes in commercial markets. Other complexities arise when the information is not actually stolen, but where the foreign intelligence service (or business) buys one copy of a high-technology product, and then
208:
An attache might ask a foreign official for information about a piece of foreign equipment. Clandestine operations have been mounted to obtain critical enemy materiel. Probably the most expensive and most ambitious was the construction of
139:
foreign equipment and materiel for the purposes of preventing technological surprise, assessing foreign scientific and technical capabilities, and developing countermeasures designed to neutralize an adversary's technological advantages."
235:
prepared technical manuals on certain items of enemy equipment; included information about enemy equipment in catalogs of enemy equipment and in handbooks about foreign forces; and published technical intelligence in various reports.
166:
Scientific and technical characteristics, capabilities, and limitations of foreign military systems, weapons, weapon systems, and materiel; the research and development related thereto; and the production methods employed for their
171:
S&TI covers not just the equipment, but the process by which it was developed and produced, the production rate of the country or organization making it, and possibly the economic and other priorities given to the project.
607:
Porteous mentions that in Montreal, two members of the Stasi, the former East German secret police, explained how they used phony work records from "sympathetic companies" to gain employment at targeted Canadian companies.
640:
warned U.S. aircraft manufacturers to be on the lookout for French spies at the Paris Air Show, and intelligence officials have claimed that France regularly sponsors the theft of information from U.S. companies.".
460:(DGSE), to favour some French firms over others in distributing material obtained through economic espionage. The incident reportedly cooled relations between the DGSE and certain elements of French industry. 631:"China has also warned its people about foreigners seeking economic intelligence. (In this instance the Chinese government felt 1000-year-old remedies and ancient healing techniques required protection.)" 936: 488:
Conventions and trade shows, of course, offer information. It can be quite easy to enter a show for the "industry only", although more difficult if the event requires a verified security clearance.
198:"Foxbat" to Hakodate, Japan on 6 September 1976. The United States granted Belenko asylum and assisted in the dismantling of the aircraft so that it could be crated for return to the Soviet Union. 205:
wish lists, to guide systematic collection efforts. Materiel required may be obtained through any number of channels. For example, materiel may be obtained through commercial channels.
403:
Violation of export controls may overlap with information acquisition, or the exported equipment or materials may themselves be things difficult for the offending country to produce.
623:
agency, advertised for "university graduates for analyst positions noting that "graduation in fields such as economics, international business, commerce ... would be an asset"."
753:"The concept of "economic well-being" used above is also found in the British Intelligence Services Act, 1994. The act discloses for the first time the functions of the British 898: 437: 842:
According to Porteous, statement clearly envisages the use of clandestine methods to obtain this intelligence where "overt collection... from open sources is inadequate".
705: 356:
In contrast with tactical technical intelligence, national level science and technology information tends to come less from capture of foreign equipment, and more from
1756: 652: 579:
to differentiate their economic intelligence activities in France from the direct industry-support activities in which French intelligence had engaged in the USA."
457: 1969: 52: 1520: 477:
Joint ventures, perhaps not even on the target technology, but to bring intelligence collectors in contact with people or facilities with sensitive information.
944: 771: 700:"To address the lag in technology, Soviet authorities in 1970 reconstituted and invigorated the USSR's intelligence collection for science and technology. The 159:) analysis and production resulting from the collection, evaluation, analysis, and interpretation of foreign scientific and technical information that covers: 1766: 523: 433: 515:(Germany-France-Spain, but operating under Dutch law). There are also enterprises owned by a combination of industry and government, such as the French 415:
fighter aircraft. Even more sensitive, however, is scientific and technical information-gathering by allies, such as Japan, France, and Israel.
63: 1108: 742:"In June of 1994, Russian presidential aide Yuriy Baturin accused Asian countries, particularly China and North Korea, of economic espionage." 750:
Reuter's stories from Britain make similar claims involving a middle-eastern power and a multibillion-dollar arms deal the UK was bidding on.
663:"German articles talk of American or French use of signals intelligence (SIGINT) capacity to eavesdrop on sensitive commercial transactions." 1003: 830:
detailed just what his administration expected from American intelligence with regard to protecting or pursuing American economic interests
377:
as illegal, when done for commercial purposes. Technology transfer that involves militarily critical technologies are more commonly a matter
1899: 1563: 1350: 1995: 1546: 1513: 724: 31: 1962: 1603: 907: 1211: 701: 1791: 1761: 1506: 1944: 1031: 616: 1593: 481:
work from the country with the technology, to other countries where protection may be more difficult, is another approach.
1473:
1945. This manual is available in the Digital Commons @ the University of Nebraska-Lincoln. Chapter IX, "Equipment,"
720: 615:
While there has been no official Canadian statement about targeting scientific, technical and economic intelligence, the
485:
outsourced administrative services, such as payroll, can give clues to which individuals might be targets for approaches.
113:, addresses information collected or analyzed about the broad range of foreign science, technology, and weapon systems. 1537: 20: 1106: 1091:
A Matter of Risk: the Incredible Inside Story of the CIA's Hughes Glomar Explorer Mission to Raise a Russian Submarine
1323: 1056: 986: 81: 1418: 2000: 1894: 1886: 786: 1990: 1904: 360:
or creative business relationships. There are some national-level attempts to salvage foreign equipment, such as
288: 809:
In two cases cited in the report, "the fact that the subject of American intelligence collection was bribery."
287:
armed with 1,200 high explosive (HE) rounds. All of the weaponry was insufficient to penetrate the armor of the
1835: 1660: 1575: 1075: 373: 1529: 792:
distinguished between what is licit for the US government and illicit for companies: "I... reserve the term
775: 305:
was the leading World War II British expert on electronic warfare. He was one of the primary analysts of the
1197:
Defense Industrial Security: Weaknesses in U.S. Security Arrangements With Foreign-Owned Defense Contractors
134:. Technical intelligence should not be confused with intelligence obtained "by technical means". That is a 441: 568:
Citing a US example, Porteous describes a useful distinction: "... the CIA recently distinguished between
1952: 754: 736: 214: 1464:
Handbook on the British Army with supplements on the Royal Air Force and civilian defense organizations,
826:
In a statement in 1995 entitled "A National Security Strategy of Engagement and Enlargement", President
201:
Procedures have been established for development of scientific and technical intelligence requirements,
496: 397: 800: 1142: 1117: 312:
US programs at the end of World War Two included Historical technical intelligence programs include
1867: 1598: 1009: 732: 716: 592: 449: 1283: 1265: 1236: 1175: 845:
Russell observes "France and Japan provide illustrative examples of foreign governments' actions.
647:
for alleged US economic intelligence-gathering, although Knight stated the US denied the charges.
56:
that states a Knowledge editor's personal feelings or presents an original argument about a topic.
1919: 1909: 1857: 1588: 867: 857: 712: 260: 156: 961:
TECHINT: Multi-Service Tactics, Techniques, and Procedures for Technical Intelligence Operations
59: 1852: 1801: 1558: 210: 1821: 302: 1107:
US National Counterintelligence Executive, Office of the Director of National Intelligence,
400:
forbidding reverse engineering are common in software, but less so in other business areas.
1924: 1862: 1748: 1704: 1689: 1638: 1583: 793: 272: 1476:
is the chapter about Soviet weapons and equipment prepared by the Army Technical Services.
8: 1957: 1831: 1648: 1621: 1218: 900:
Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms
872: 393: 313: 163:
Foreign developments in basic and applied research and in applied engineering techniques;
1929: 1914: 1806: 1781: 1719: 1670: 1655: 1301: 862: 779: 276: 131: 1493: 1110:
Annual Report to Congress on Foreign Economic Collection and Industrial Espionage—2005
1771: 1069: 1052: 1027: 982: 264: 1352:
The Capabilities of the U.S. Government to Collect and Analyze Economic Intelligence
1045: 837: 301:
for information on a British raid to capture German radar for technical evaluation.
294:. This failure is directly attributed to the first U.S. casualty of the Korean war. 1826: 1776: 1370: 298: 16:
Information about the weapons and technological capabilities of a foreign adversary
1397: 801:
Statements of current and past US officials about economic intelligence collection
243: 1714: 1643: 959: 361: 328: 324: 259:, when the American led Task Force Smith was deployed from Japan to confront the 1474: 1371:"Section 5, Economic Intelligence Collection directed against the United States" 316:, the general program directed at German scientists and engineers at the end of 1811: 1631: 252: 191: 1266:"Commentary No. 59: Economic / Commercial Interests and Intelligence Services" 522:
Foreign intelligence services, or foreign companies, may still try to recruit
1984: 1729: 1709: 1694: 789: 23:. For a hierarchical list of articles, see the intelligence cycle management 226:
excellent account of the exploitation of Axis aircraft during World War II.
1816: 1734: 1724: 1665: 1414: 827: 536: 516: 317: 268: 127: 106: 1498: 1143:"Encyclopedia of Espionage, Intelligence, and Security—Economic Espionage" 364:, a complex and clandestine attempt to recover a sunken Soviet submarine. 1626: 1424: 306: 135: 1457:
Signal Communications Directory, Japanese Radio Communication Equipment.
1398:"Former CIA Director Says US Economic Spying Targets "European Bribery"" 1699: 478: 256: 1368: 380:
This law contains two provisions criminalizing two sorts of activity:
238: 1680: 1675: 1613: 284: 280: 251:
A well studied failure of technical intelligence occurred during the
217:
to obtain the wreckage of Soviet submarine that sunk in the Pacific.
1684: 1358:(Master's degree thesis), US Army Command and General Staff College 1209: 408: 123: 507:
Multinational programs may be even more common in Europe, such as
838:
Expert inference about economic intelligence collection by the US
508: 492: 1212:"DoD 5200.1 -PH-2 Hostile Intelligence Threat – U.S. Technology" 957: 147: 1001: 728: 620: 512: 412: 357: 195: 184: 102: 1194: 351: 727:
were to provide Directorate T and its operating arm, called
1324:"C.I.A. Confirms Blunders During Economic Spying on France" 758: 555: 452:
merged with other groups and wound up being international.
445: 291: 53:
personal reflection, personal essay, or argumentative essay
1420:
A National Security Strategy of Engagement and Enlargement
1302:"Countering Industrial Espionage in the Post-Cold-War-Era" 1063:
Most Secret War: British Scientific Intelligence 1939-1945
896: 155:
Scientific and technical intelligence (S&TI) is "the (
1288:
Canadian Security Intelligence Service, Commentary Series
1270:
Canadian Security Intelligence Service, Commentary Series
1180:
Canadian Security Intelligence Service, Commentary Series
1047:
The Wizard War: British Scientific Intelligence 1939-1945
709: 575:
intelligence used to influence events at the firm level,
572:
intelligence used to inform government policy-makers and
142: 1970:
Counterintelligence and counter-terrorism organizations
1024:
The War for Korea, 1950–1951: They Came from the North
772:
Organisation for Economic Co-operation and Development
229: 220: 1210:
United States Department of Defense (November 1998).
1147:
Encyclopedia of Espionage, Intelligence, and Security
418: 367: 334: 529: 434:
Microelectronics and Computer Technology Corporation
1423:, Executive Office of the President, archived from 1413: 1369:Interagency OPSEC Support Staff (IOSS) (May 1996), 1317: 1315: 1259: 1257: 1255: 1253: 1251: 1249: 320:. It is most often associated with rocket science. 239:
Historical examples of field technical intelligence
19:This article is a subset article in a series under 1044: 757:(SIS) and Government Communications Headquarters ( 687: 463: 327:, focusing on nuclear science and engineering and 130:is an example of foreign equipment adopted by the 695: 643:France declared several US intelligence officers 175: 1982: 1375:Operations Security Intelligence Threat Handbook 1312: 1246: 1195:U.S. General Accounting Office (February 1996), 897:U.S. Department of Defense (February 15, 2013). 384:Theft of trade secrets to benefit foreign powers 1228: 1169: 1167: 1165: 1163: 1161: 1159: 1157: 1155: 1299: 1102: 1100: 958:Air Land Sea Applications Center (June 2006), 599:not collect information from other countries. 387:Theft of trade secrets for commercial purposes 1514: 1136: 1134: 1132: 1130: 1088: 943:, Central Intelligence Agency, archived from 708:established a new unit, Directorate T of the 1275: 1203: 1176:"Commentary No. 46: Economic Espionage (II)" 1152: 1042: 976: 653:Direction gĂ©nĂ©rale de la sĂ©curitĂ© extĂ©rieure 499:techniques to penetrate information systems. 458:Direction gĂ©nĂ©rale de la sĂ©curitĂ© extĂ©rieure 185:Collection of materiel and related documents 1528: 1494:U.S. Army Technical Intelligence Chronology 1407: 1391: 1389: 1321: 1284:"Commentary No. 32: Economic Espionage (I)" 1097: 930: 928: 595:" of China will only increase this trend." 396:its technology to use in its own products. 352:Collection techniques at the national level 1521: 1507: 1344: 1342: 1340: 1338: 1336: 1237:"The growing threat of economic espionage" 1127: 979:MiG Pilot: the Final Escape of Lt. Belenko 937:"The Farewell Dossier: Duping the Soviets" 32:list of intelligence gathering disciplines 1293: 1234: 1082: 116: 82:Learn how and when to remove this message 1395: 1386: 1281: 1263: 1173: 925: 892: 890: 888: 556:Espionage examples at the national level 242: 146: 1935:Scientific & Technical intelligence 1443:German 88-mm Antiaircraft Gun Materiel. 1348: 1333: 343:Similarly, Joseph E. Smith, who edited 1983: 1479:US Army Technical Manual TM E30-451. 1455:US Army Technical Manual TM E11-227A. 1362: 1190: 1188: 1140: 1036: 348:by test firing the German ammunition. 109:of foreign nations. The related term, 1502: 1471:Handbook of U.S.S.R. Military Forces. 1469:US Army Technical Manual TM 30–430. 1462:US Army Technical Manual TM 30–410. 1441:US Army Technical Manual TM E9-369A. 1235:Schweizer, Peter (Summer–Fall 1998), 1002:Air Force Historical Studies Office, 970: 934: 885: 617:Communications Security Establishment 143:Scientific and technical intelligence 111:scientific and technical intelligence 1757:By alliances, nations and industries 1483:1945. (reprinted by LSU Press 1990) 1448:US Army Technical Manual TM E9-803. 1396:Campbell, Duncan (3 December 2000), 1089:Varner, Roy; Collier, Wayne (1978), 995: 323:Other contemporary efforts included 255:, the first major engagement of the 35: 1481:Handbook of German Military Forces. 1185: 719:programs of Western economies. The 230:Production of finished intelligence 221:Exploitation (testing and analysis) 13: 1996:Intelligence gathering disciplines 1435: 723:on Science and Technology and the 419:Efficiency of espionage activities 368:Scientific and technical espionage 335:Use of enemy material in the field 267:capabilities were six obsolescent 21:intelligence collection management 14: 2012: 774:(OECD) to pass legislation — the 745: 530:Relation to economic intelligence 1300:Cohen, William (June 24, 1992), 787:Director of Central Intelligence 764: 731:, with collection requirements. 448:) networking. Some, such as the 40: 1905:Words of estimative probability 1767:Operational platforms by nation 1486:US Army Field Manual FM 34–54. 1349:Russell, Erica Ballard (1994), 688:Republic of Korea (South Korea) 464:Espionage collection techniques 247:Limber Freya radar illustration 1322:Weiner, Tim (March 13, 1996), 1264:Porteous, Samuel (July 1995), 1174:Porteous, Samuel (July 1994), 1026:, University Press of Kansas, 1016: 951: 725:Military-Industrial Commission 696:Former Soviet Union and Russia 546:trade negotiation intelligence 374:Economic Espionage Act of 1996 176:Technical intelligence process 1: 1306:Congressional Record (Senate) 1282:Porteous, Samuel (May 1993), 906:. p. 296. Archived from 878: 776:Foreign Corrupt Practices Act 181:exploitation and production. 438:Corporation for Open Systems 7: 1953:Intelligence cycle security 851: 755:Secret Intelligence Service 733:Military Intelligence (GRU) 549:macro-economic intelligence 398:End user license agreements 331:, devoted to aerodynamics. 215:Central Intelligence Agency 10: 2017: 1074:: CS1 maint: postscript ( 1022:Millett, Allan R. (2010), 1005:Air Technical Intelligence 737:Soviet Academy of Sciences 658: 105:and equipment used by the 29: 18: 1943: 1885: 1845: 1790: 1747: 1612: 1574: 1554: 1545: 1536: 666: 634: 602: 263:southward advance, their 675: 626: 593:socialist market economy 450:Open Software Foundation 192:Viktor Ivanovich Belenko 101:) is intelligence about 24: 2001:Intelligence assessment 1920:Intelligence assessment 1910:All-source intelligence 1530:Intelligence management 1488:Technical Intelligence. 1141:Knight, Judson (2004), 941:Studies in Intelligence 868:Geospatial intelligence 858:All-source intelligence 713:First Chief Directorate 511:(UK-Germany-Italy) and 345:Small Arms of the World 157:All-source intelligence 1991:Technical intelligence 1604:Operational techniques 1559:Special reconnaissance 935:Weiss, Gus W. (1996), 271:rocket launchers, two 261:Korean People's Army's 248: 211:Hughes Glomar Explorer 152: 117:Technical intelligence 95:Technical intelligence 62:by rewriting it in an 1043:Jones, R. V. (1978), 977:Barron, John (1980), 273:M20 recoilless rifles 246: 150: 1925:Medical intelligence 1895:Competing hypotheses 1705:Industrial espionage 1690:Denial and deception 794:industrial espionage 702:Council of Ministers 619:(CSE), the Canadian 1958:Counterintelligence 1873:Technical (TECHINT) 1868:Open-source (OSINT) 1858:Geospatial (GEOINT) 1832:Casualty estimation 1427:on January 20, 2010 1415:Clinton, William J. 1051:, Hamish Hamilton, 913:on February 9, 2017 873:Technology transfer 495:or other malicious 314:Operation Paperclip 1930:Military geography 1915:Basic intelligence 1853:Financial (FININT) 1794:signature (MASINT) 1720:One-way voice link 1656:Concealment device 1450:German Volkswagen. 863:Basic intelligence 780:Warren Christopher 432:down, such as the 249: 153: 64:encyclopedic style 51:is written like a 1978: 1977: 1881: 1880: 1772:Direction finding 1762:In modern history 1743: 1742: 1417:(February 1995), 1199:, GAO/NSIAD-96-64 1032:978-0-7006-1709-8 706:Central Committee 645:persona non grata 394:reverse engineers 283:, and six 105 mm 92: 91: 84: 2008: 1777:Traffic analysis 1749:Signals (SIGINT) 1584:Asset recruiting 1552: 1551: 1543: 1542: 1523: 1516: 1509: 1500: 1499: 1429: 1428: 1411: 1405: 1404: 1393: 1384: 1383: 1382: 1381: 1366: 1360: 1359: 1357: 1346: 1331: 1330: 1319: 1310: 1309: 1297: 1291: 1290: 1279: 1273: 1272: 1261: 1244: 1243: 1241:Entrepreneur.com 1232: 1226: 1225: 1223: 1217:. Archived from 1216: 1207: 1201: 1200: 1192: 1183: 1182: 1171: 1150: 1149: 1138: 1125: 1124: 1122: 1116:, archived from 1115: 1104: 1095: 1094: 1086: 1080: 1079: 1073: 1065: 1050: 1040: 1034: 1020: 1014: 1013: 1008:, archived from 999: 993: 991: 974: 968: 967: 966: 955: 949: 948: 947:on June 13, 2007 932: 923: 922: 920: 918: 912: 905: 894: 299:Operation Biting 277:4.2 inch mortars 87: 80: 76: 73: 67: 44: 43: 36: 2016: 2015: 2011: 2010: 2009: 2007: 2006: 2005: 1981: 1980: 1979: 1974: 1939: 1877: 1863:Imagery (IMINT) 1841: 1802:Electro-optical 1793: 1792:Measurement and 1786: 1739: 1715:Numbers station 1644:Black operation 1608: 1570: 1532: 1527: 1438: 1436:Further reading 1433: 1432: 1412: 1408: 1394: 1387: 1379: 1377: 1367: 1363: 1355: 1347: 1334: 1320: 1313: 1298: 1294: 1280: 1276: 1262: 1247: 1233: 1229: 1221: 1214: 1208: 1204: 1193: 1186: 1172: 1153: 1139: 1128: 1120: 1113: 1105: 1098: 1087: 1083: 1067: 1066: 1061:; UK title was 1059: 1041: 1037: 1021: 1017: 1000: 996: 989: 975: 971: 964: 956: 952: 933: 926: 916: 914: 910: 903: 895: 886: 881: 854: 840: 803: 767: 748: 721:State Committee 715:, to plumb the 698: 690: 678: 669: 661: 637: 629: 605: 558: 532: 466: 421: 370: 362:Project Azorian 354: 337: 329:Operation Lusty 325:Operation Alsos 241: 232: 223: 187: 178: 145: 119: 88: 77: 71: 68: 60:help improve it 57: 45: 41: 34: 28: 17: 12: 11: 5: 2014: 2004: 2003: 1998: 1993: 1976: 1975: 1973: 1972: 1967: 1966: 1965: 1955: 1949: 1947: 1941: 1940: 1938: 1937: 1932: 1927: 1922: 1917: 1912: 1907: 1902: 1900:Target-centric 1897: 1891: 1889: 1883: 1882: 1879: 1878: 1876: 1875: 1870: 1865: 1860: 1855: 1849: 1847: 1843: 1842: 1840: 1839: 1829: 1824: 1822:Radiofrequency 1819: 1814: 1809: 1804: 1798: 1796: 1788: 1787: 1785: 1784: 1779: 1774: 1769: 1764: 1759: 1753: 1751: 1745: 1744: 1741: 1740: 1738: 1737: 1732: 1727: 1722: 1717: 1712: 1707: 1702: 1697: 1692: 1687: 1678: 1673: 1668: 1663: 1658: 1653: 1652: 1651: 1641: 1636: 1635: 1634: 1629: 1618: 1616: 1610: 1609: 1607: 1606: 1601: 1596: 1591: 1586: 1580: 1578: 1572: 1571: 1569: 1568: 1567: 1566: 1555: 1549: 1547:Human (HUMINT) 1540: 1534: 1533: 1526: 1525: 1518: 1511: 1503: 1497: 1496: 1491: 1484: 1477: 1467: 1460: 1453: 1446: 1437: 1434: 1431: 1430: 1406: 1385: 1361: 1332: 1328:New York Times 1311: 1292: 1274: 1245: 1227: 1224:on 2008-02-28. 1202: 1184: 1151: 1126: 1096: 1093:, Random House 1081: 1057: 1035: 1015: 994: 987: 969: 950: 924: 883: 882: 880: 877: 876: 875: 870: 865: 860: 853: 850: 839: 836: 802: 799: 766: 763: 747: 746:United Kingdom 744: 697: 694: 689: 686: 677: 674: 668: 665: 660: 657: 636: 633: 628: 625: 604: 601: 577: 576: 573: 557: 554: 553: 552: 551: 550: 547: 531: 528: 501: 500: 489: 486: 482: 475: 474:requirements." 465: 462: 420: 417: 389: 388: 385: 369: 366: 353: 350: 336: 333: 253:Battle of Osan 240: 237: 231: 228: 222: 219: 194:flew a Soviet 186: 183: 177: 174: 169: 168: 164: 151:Soviet Bombers 144: 141: 118: 115: 90: 89: 48: 46: 39: 15: 9: 6: 4: 3: 2: 2013: 2002: 1999: 1997: 1994: 1992: 1989: 1988: 1986: 1971: 1968: 1964: 1963:organizations 1961: 1960: 1959: 1956: 1954: 1951: 1950: 1948: 1946: 1945:Dissemination 1942: 1936: 1933: 1931: 1928: 1926: 1923: 1921: 1918: 1916: 1913: 1911: 1908: 1906: 1903: 1901: 1898: 1896: 1893: 1892: 1890: 1888: 1884: 1874: 1871: 1869: 1866: 1864: 1861: 1859: 1856: 1854: 1851: 1850: 1848: 1844: 1837: 1833: 1830: 1828: 1825: 1823: 1820: 1818: 1815: 1813: 1810: 1808: 1805: 1803: 1800: 1799: 1797: 1795: 1789: 1783: 1780: 1778: 1775: 1773: 1770: 1768: 1765: 1763: 1760: 1758: 1755: 1754: 1752: 1750: 1746: 1736: 1733: 1731: 1730:Steganography 1728: 1726: 1723: 1721: 1718: 1716: 1713: 1711: 1710:Interrogation 1708: 1706: 1703: 1701: 1698: 1696: 1695:Eavesdropping 1693: 1691: 1688: 1686: 1682: 1679: 1677: 1674: 1672: 1669: 1667: 1664: 1662: 1659: 1657: 1654: 1650: 1647: 1646: 1645: 1642: 1640: 1637: 1633: 1630: 1628: 1625: 1624: 1623: 1620: 1619: 1617: 1615: 1611: 1605: 1602: 1600: 1599:Direct action 1597: 1595: 1594:Covert action 1592: 1590: 1587: 1585: 1582: 1581: 1579: 1577: 1573: 1565: 1564:organizations 1562: 1561: 1560: 1557: 1556: 1553: 1550: 1548: 1544: 1541: 1539: 1535: 1531: 1524: 1519: 1517: 1512: 1510: 1505: 1504: 1501: 1495: 1492: 1489: 1485: 1482: 1478: 1475: 1472: 1468: 1465: 1461: 1458: 1454: 1451: 1447: 1444: 1440: 1439: 1426: 1422: 1421: 1416: 1410: 1403: 1399: 1392: 1390: 1376: 1372: 1365: 1354: 1353: 1345: 1343: 1341: 1339: 1337: 1329: 1325: 1318: 1316: 1307: 1303: 1296: 1289: 1285: 1278: 1271: 1267: 1260: 1258: 1256: 1254: 1252: 1250: 1242: 1238: 1231: 1220: 1213: 1206: 1198: 1191: 1189: 1181: 1177: 1170: 1168: 1166: 1164: 1162: 1160: 1158: 1156: 1148: 1144: 1137: 1135: 1133: 1131: 1123:on 2007-12-14 1119: 1112: 1111: 1103: 1101: 1092: 1085: 1077: 1071: 1064: 1060: 1058:0-241-89746-7 1054: 1049: 1048: 1039: 1033: 1029: 1025: 1019: 1012:on 2007-12-31 1011: 1007: 1006: 998: 990: 988:0-380-53868-7 984: 980: 973: 963: 962: 954: 946: 942: 938: 931: 929: 909: 902: 901: 893: 891: 889: 884: 874: 871: 869: 866: 864: 861: 859: 856: 855: 849: 846: 843: 835: 831: 829: 824: 820: 817: 813: 810: 806: 798: 795: 791: 790:James Woolsey 788: 783: 781: 777: 773: 765:United States 762: 760: 756: 751: 743: 740: 738: 734: 730: 726: 722: 718: 714: 711: 707: 703: 693: 685: 681: 673: 664: 656: 654: 648: 646: 641: 632: 624: 622: 618: 613: 609: 600: 596: 594: 588: 584: 580: 574: 571: 570: 569: 566: 562: 548: 545: 544: 543: 542: 541: 538: 527: 525: 520: 518: 514: 510: 505: 498: 494: 490: 487: 483: 480: 476: 472: 471: 470: 461: 459: 453: 451: 447: 443: 439: 435: 429: 425: 416: 414: 410: 404: 401: 399: 395: 386: 383: 382: 381: 378: 375: 365: 363: 359: 349: 346: 341: 332: 330: 326: 321: 319: 315: 310: 308: 304: 300: 295: 293: 290: 286: 282: 281:60 mm mortars 278: 274: 270: 266: 262: 258: 254: 245: 236: 227: 218: 216: 212: 206: 204: 199: 197: 193: 182: 173: 167:manufacture." 165: 162: 161: 160: 158: 149: 140: 137: 133: 129: 125: 114: 112: 108: 104: 100: 96: 86: 83: 75: 65: 61: 55: 54: 49:This article 47: 38: 37: 33: 26: 22: 1934: 1872: 1735:Surveillance 1725:Resident spy 1666:Cryptography 1487: 1480: 1470: 1463: 1456: 1449: 1442: 1425:the original 1419: 1409: 1401: 1378:, retrieved 1374: 1364: 1351: 1327: 1305: 1295: 1287: 1277: 1269: 1240: 1230: 1219:the original 1205: 1196: 1179: 1146: 1118:the original 1109: 1090: 1084: 1062: 1046: 1038: 1023: 1018: 1010:the original 1004: 997: 978: 972: 960: 953: 945:the original 940: 917:September 1, 915:. Retrieved 908:the original 899: 847: 844: 841: 832: 828:Bill Clinton 825: 821: 818: 814: 811: 807: 804: 784: 768: 752: 749: 741: 699: 691: 682: 679: 670: 662: 649: 644: 642: 638: 630: 614: 610: 606: 597: 589: 585: 581: 578: 567: 563: 559: 537:Aldrich Ames 533: 521: 517:Thales Group 506: 502: 467: 454: 430: 426: 422: 411:for Swedish 405: 402: 390: 379: 371: 355: 344: 342: 338: 322: 318:World War II 311: 296: 289:Soviet built 269:M9A1 Bazooka 250: 233: 224: 207: 202: 200: 188: 179: 170: 154: 128:World War II 120: 110: 107:armed forces 98: 94: 93: 78: 69: 50: 1807:Geophysical 1589:Cell system 1576:Clandestine 524:individuals 307:Oslo Report 136:term of art 1985:Categories 1836:earthquake 1700:False flag 1538:Collection 1380:2007-10-03 879:References 612:members." 479:Offshoring 303:R.V. Jones 292:T-34 tanks 257:Korean War 30:See also: 1827:Materials 1681:Defection 1676:Dead drop 1649:black bag 1614:Espionage 1402:Telepolis 285:howitzers 265:anti-tank 72:July 2011 25:hierarchy 1887:Analysis 1685:Turncoat 1632:handling 1070:citation 852:See also 704:and the 436:and the 409:avionics 124:jerrycan 1834: ( 1812:Nuclear 1782:TEMPEST 1308:: S8732 785:Former 717:R&D 659:Germany 509:Panavia 497:hacking 493:spyware 491:Use of 372:The US 279:, four 213:by the 132:US Army 103:weapons 99:TECHINT 58:Please 1671:Cutout 1622:Agents 1055:  1030:  985:  735:, the 729:Line X 667:Israel 635:France 621:SIGINT 603:Canada 513:Airbus 413:Gripen 358:HUMINT 275:, two 196:Mig 25 1846:Other 1817:Radar 1661:Cover 1639:Asset 1627:field 1490:1998. 1466:1943. 1459:1944. 1452:1944. 1445:1943. 1356:(PDF) 1222:(PDF) 1215:(PDF) 1121:(PDF) 1114:(PDF) 965:(PDF) 911:(PDF) 904:(PDF) 710:KGB's 676:Japan 627:China 1076:link 1053:ISBN 1028:ISBN 983:ISBN 919:2019 759:GCHQ 446:ISDN 444:and 440:(in 297:See 203:i.e. 442:OSI 126:of 1987:: 1683:/ 1400:, 1388:^ 1373:, 1335:^ 1326:, 1314:^ 1304:, 1286:, 1268:, 1248:^ 1239:, 1187:^ 1178:, 1154:^ 1145:, 1129:^ 1099:^ 1072:}} 1068:{{ 981:, 939:, 927:^ 887:^ 526:. 519:. 309:. 1838:) 1522:e 1515:t 1508:v 1078:) 992:. 921:. 97:( 85:) 79:( 74:) 70:( 66:. 27:.

Index

intelligence collection management
hierarchy
list of intelligence gathering disciplines
personal reflection, personal essay, or argumentative essay
help improve it
encyclopedic style
Learn how and when to remove this message
weapons
armed forces
jerrycan
World War II
US Army
term of art

All-source intelligence
Viktor Ivanovich Belenko
Mig 25
Hughes Glomar Explorer
Central Intelligence Agency

Battle of Osan
Korean War
Korean People's Army's
anti-tank
M9A1 Bazooka
M20 recoilless rifles
4.2 inch mortars
60 mm mortars
howitzers
Soviet built

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑