Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

INMS 6 1 0 Intelligence Collection Yesterday, our office received an OSINT report that Ukrainian forces struck a Russian airfield in the Crimea on 9

INMS
6
1
0
Intelligence Collection
Yesterday, our office received an OSINT report that Ukrainian forces struck a Russian airfield in the Crimea on
9
August
2
0
2
2
.
Commercial satellite imagery of the Russian Airforce base at Saki in Novofedorivka indicated that at least
1
0
Russian military aircraft were destroyed or seriously damaged bye series of explosions. This is assessed to be the largest single
-
day loss for Russian air power since Russia widened its war on Ukraine in late February.
We are to design a collection strategy using literal intelligence collection resources. Determine how this collection could be used to assess the intelligence requirements if Ukraine attacked this Russian airfield, the battle damage to the facility, and impact on Russian operations.
Saki Russian Airfield
(
1
0
August
2
0
2
2
)
-
Circles and an oblong mark destroyed and suspected destroyed Russian Su
-
2
4
s and Su
-
3
0
s fighters
Address the following tasks in this assignment:
Provide analysis of the literal collection disciplines available to us and how we would use them to answer the intelligence requirements. For example, how HUMINT, OSINT and COMINT collection could be used to address the intelligence requirements.
Provide plausible examples of published or internet sources, or notional HUMINT techniques, and SIGINT sources. For example, how COMINT could be used to address intelligence requirements.
How would we sequence collection for the best results? For example, emphasize the benefits of more comprehensive COMINT versus more timely OSINT collection?
Address any management issues needed to be considered. For example, availability, intelligence sharing, including foreign partner collection capabilities.
What is our alternate collection strategy if we cannot get the assets we request? For example, initial use of OSINT and subsequent HUMINT and SIGINT collection to verify unclassified sources.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Refactoring Databases Evolutionary Database Design

Authors: Scott Ambler, Pramod Sadalage

1st Edition

0321774515, 978-0321774514

More Books

Students also viewed these Databases questions