Deception and Denial (D&D) of SIGINT – SIGINT is very vulnerable to deception due to its inherent need for exploiting RF signals. Location of the signal or RF wave can be deceived to be generated or coming from one location that is not originally come from. This can be occurred from two possible things: one is the terrain (hilly or mountainous) can have a huge impact on the properly locating the signal and secondly, the signal is that being collected can be spoof to provide miss intelligence if the enemy believes that there communications are being monitored.
5. Operation Security (OPSEC) – OPSEC is very important part of any mission regardless if its intelligence driven or tactical mission. OPSEC is about controlling how much and what to say in the public arenas without divulging something sensitive or allowing the big picture being painted with a little amount of information given.
6. SIGINT Collection and Processing – Collection and Processing is most vital part of the intelligence cycle. This really starts with correct, accurate and adequate intelligence requirements that are vital to starting with a collection plan. With having the correct requirement that provides the necessary information will allow the SIGINT collector to execute any collection plan flawlessly. Processing raw SIGINT requires the need for analysts the need to know and how to process the right information which will aid the Analysis portion of the Intelligence …show more content…
SIGINT Analysis – The analysis portion of the Intelligence Cycle is the second most important process of the cycle. The analysis of the Intelligence Cycle will allow for the analyst to provide both or either the policymaker or warfighter the necessary intelligence to make sound decisions. Analyst must be able have the necessary and accurate requirements to comb through mountains and mountains of data that is collected and process. During these times of technological evolution, SIGINT Analyst maintains the same persistent of those analysts that pave the way from the Venona Project days.
8. Intelligence Sharing Across the Enterprise – Sharing intelligence, information and resources across the Intelligence Community (IC) Enterprise will allow for analyst to cross pollinate intelligence. Sharing resources will all the entire IC to take advantage of the technological advances from one intelligence agency to another. Sharing intelligence moves across multiple planes of macro to micro level intelligence