A COLLECTION PLAN FOR ASSESSING THE US RESPONSE ON THE KOREAN ARMY`S 15 DAYS MILITARY EXERCISE
ACOLLECTION PLAN FOR ASSESSING THE US RESPONSE ON THE KOREAN ARMY’S15 DAYS MILITARY EXERCISE
Purposeof the Paper
Thispaper is aimed at identifying various target areas in which the Koreagovernment in this case will be using to counter the adverse effectsof the US government after imposing an economic embargo on the stateof Korea. Korea has no force intentions of attacking US but if theybegin assaulting or attacking Korea, various responses will be put totask to counter their adversaries. This paper will illustrate more onthe way the Korean armies will collect the information on the plansmade by the U.S.
Koreahas several intelligent agencies namely OSINT, GEOINT,MASINT, HUMINT SIGINT and CYBINT1.HUMINT is a human intelligence and is gotten from a person in theground while GEOINT is a geospatial intelligence and is derived fromsatellites and mapping data. MASINT is measurement and signatureintelligence. This is derived from radiations and radars. Also, OSINTis another intelligence which is called open source intelligence andis gotten from open sources. In addition SIGINT means signalintelligence and is gotten by intercepting the signals. Lastly,CYBINT is cyber intelligence and is derived from cyberspace2.
Dueto military exercise by Korea as a result of imposition of economicembargo on its state, Korea will try as much as possible to collectthe planned activities by the US through OSIT as an intelligentactivity in the 15 days and this will involve four steps namely
Identification of information and intelligence needs
Categorization of these needs
Identification of sources of information
Determination of collection methods.
Koreawill use the following sources to collect the informationconfidential sources and open sources:
Confidential sources include any person, group that give information and expecting the information not to be disclosed to the public.
Open sources consist of any person or group that give information without any of its expectation
Thenon-cyber targets of Korea are the
Government agencies and NGOs Database, information posted, printed reports on economical, geographical, and security issues.
public information such as on topics being posted and printed at international or regional or local level
Individuals and group information which are handwritten printed or broadcasted on the topic on the mobilization of forces for the fifteen days.
From materials found by searching on the web.
Koreaintelligence will then determine the collection techniques and willtarget on
Internet Web site.
Moreelaborations are shown below
Digital video disks
Tape Compact data
Low frequency AM radios
Medium frequency AM radios
VHF FM radios
Band satellite television
VHF and UHF television
Information(Web page content)
Search and URL lookups
OSINTpersonnel can do research on the plans by US by
Attending forums such as conferences, demonstrations lecture, public meeting and debate.
Media, magazines, internet, television and radio
Videos, blogs and social networks
Government reports, hearings, parliament debates, hearing, press conference, leaders speech, marine warning and contract awarding
Observation airplane spotting, monitoring radio, satellite observation and satellite photography.
Literature symposiums and academic papers
Agencyfor National Security Planning will be tasked to collect thisinformation.
Thisinvolves media like trade show, military programs exchanged betweenUS and Korea, and military attachment program. The Korea governmentwill use businessmen, students or scholars studying in US, Koreadiplomats and scientist in the quest to get information. Thisintelligence will be carried out by the Ministry Of People’sSecurity, State Security Department and Border Guard3.They will use pressure in order to get information on what is beingplanned by US though the Korean immigrants especially those with highmilitary technology and military information. In addition it will usethe useful scientific programs4.
Theinformation is gotten from human sources and the public cannot beexpected to know about it. The Korea will use its diplomats andmilitary personnel to collect the data and information on the foreignUS concerning the show of the force in retaliation to an embargo. Inthis case they will look for the undisguised, sensitive and secretactivities of Korea including the main people who exploits orsupervise the forces.
Theywill target the following the following publications which are notclassified, conference results, congress hearings, interrogations andspying the US activities through travelers. The individuals spyingare protected from public identification while some agents are gottenfrom Korea citizens who have volunteered to give the information.These citizens are given higher ranks in US administration also as toprovide information on their mother nation and the Korea governmentcan source such people to leak the information to them on the USplans.Koreawill look for information from sensitive installations despite thefact that the there will be on site inspections allowed.Theywill use a number of intelligence personnel to collect informationthrough observation, sourcing information from US institutions, andcollection of readily available documentation.
Inaddition, they can access the memos distributed in US institutions.Thus the HUMINT is used to identify threat plans and intentionsbefore being put to practice. From this the Korea government willprovide evidence of documents or copies concerning the plans andintentions.
SIGINTKoreawill use aircraft, fleetof SIGINT collection vessel, satellite, and various ground locationsto gather signal of the intelligence. This will monitor thegovernment passage of information throughout the US. In addition, themicrowave towers in US are intercepted and also the informationsatellite links, with many SW and HF radio transmission. This willserve as an analytical facility for Korean SIGNIT satellite.SIGNITwill permit Korea to monitor US military and political inclinationssatellites including the white out communications, financial andpolitical services. This will be by aid of intelligent personnelwhich will provide Korea leaders with economical and political plansby the US5.Thereare a number of Korean diplomatic facilities in US and will issueKorean SIGNET with necessary information on government policiesthrough monitoring. The Covert mobiles will also be used in the 15days and it involves collection of data on electronic order ofbattle, monitoring of communications, doing findings on operationsand use of satellites to establish location accuraciesTheGRU will be used in the operation of Korean ELINT satellites whichare used to detect a target. This will aid in provision of more datafrom the US, adversary forces. When the satellites will have providedthe information on the US ships at the sea, air mobile or warningradars and more military emissions for identification, and signalanalysis, the data obtained can be used to target , offence thetarget and plan on how to defend or counter the adversary6.Collectionof information will be managed by Agencyfor National Security Planning (ANSP).Now, there is no presence of Korean COMINT satellite, nevertheless,but there is likelihood that Koreans would establish such a system indue course. Thenon cyber targets in this case will be the target voice, tele-printertraffic, video, Morse code traffic, and facsimile messages. Thiscan be collected from the air waves, cable or fiber optics. This willinvolve the retrieval and analysis of transmissions for instanceradar. Then an emitter is identified, its characteristics determinedand inferences made. SIGNIT can be operated on many areas such asships and aircraft. The SIGINT facility monitors transmission fromsatellites in addition to terrestrial facilities. KoreanCentral Intelligence Agency (KCIA)will be tasked with this opportunity. MASINT
Thetargets of MASINT include radar intelligence infrared intelligence,and nuclear intelligence. These are radar, optics and radiofrequency, detection of nuclear and seismic sensors. They will alsotarget the collection of biological, chemical, and nuclear samplesthrough the following categories
Optical missile tracking
Measurement of nuclear explosions optically
Survey on radiation
Nuclear detection in the space
Ionizing effects of radiation
Synthetic Aperture Radar
Nuclear testing analysis
MASNITworks in different electromagnet spectrums and this activity can beused to gather information patterns from US which were not capturedby sensors. MASNIT will gather information from US showing theshow-of force. They are able to collect such in formations becausethey are not protected. The Korea will use (MASINT) in intelligencefor detection, location, tracking, identifying and describing themeans the US will use in the attack in the 15 days.
Koreahas had a number of computer students training to be cyber warriorsand they will be used to hack into computers used by US army. If theyare planning a war on Korea, it will launch a virus, which will bedisseminated through websites of series of computers used by thearmy. The computers will receive waves of internet traffics. Thiswill cripple government sites and the outlets of media.
Inaddition, cyber warfare will be launched on all banks to ensure noone is able to withdraw or deposit money through use of virussoftware. This will automatically boot financial records in the USfinancial computers.
Thishacking of computers leading to cyber warfare will weaken themilitary weapons and cause traffic on the networks of computers. Inaddition, by hacking, they will be able to get leakage of militaryinformation and improve the ability to counter US armies. The Bureauwill take the responsibility for collection of strategic intelligenceto be given to the ministry of the people’s armed forces and lineup the intelligent personnel to US.
Koreawill be able to collect the all the relevant information pertainingthe adversary intentions or show off-forces of the US since it haselaborate and efficient and well equipped technology to do so. It hassatellites to monitor any plan done in the US even the White Houseand monitors its financial and political plans. In addition, it canhack into US computers and networks hence getting the leakage of theplans and the military information.
Casey,Steven. Sellingthe Korean War propaganda, politics, and public opinion in the UnitedStates, 1950-1953.Oxford: Oxford University Press, 2008.
Gause,Ken E.. Coercion,control, surveillance, and punishment: an examination of the NorthKorean police state.Washington, DC: Committee for Human Rights in North Korea, 2012.
Milliken,Jennifer. Thesocial construction of the Korean War: conflict and itspossibilities.Manchester: Manchester University Press, 2001.
Minnich,James M.. TheNorth Korean People`s Army: origins and current tactics.Annapolis, Md.: Naval Institute Press, 2005.
Monje,Scott C.. TheCentral Intelligence Agency: a documentary history.Westport, Conn.: Greenwood Press, 2008.
1 Gause, Ken E.. Coercion, control, surveillance, and punishment: an examination of the North Korean police state. Washington, DC: Committee for Human Rights in North Korea, 2012.
2 Gause, Ken E.. Coercion, control, surveillance, and punishment: an examination of the North Korean police state. Washington, DC: Committee for Human Rights in North Korea, 2012.
3 Minnich, James M.. The North Korean People`s Army: origins and current tactics. Annapolis, Md.: Naval Institute Press, 2005.
4 Casey, Steven. Selling the Korean War propaganda, politics, and public opinion in the United States, 1950-1953. Oxford: Oxford University Press, 2008.
5 Monje, Scott C.. The Central Intelligence Agency: a documentary history. Westport, Conn.: Greenwood Press, 2008.
6 Milliken, Jennifer. The social construction of the Korean War: conflict and its possibilities. Manchester: Manchester University Press, 2001.