Find a Security Clearance Job!

Intelligence


Intelligence Processing
Programs and Systems

Processing systems receive, convert, and correlate information into a form usable as combat information or intelligence. These processors are found at all echelons of the intelligence architecture, and include both primary processing and secondary exploitation systems. In some architectures, such as USIS 2000, the term processing is limited to those functions needed to convert imagery data into a scene contiguous pixel format. All other operations with the pixels are considered image analysis. Applications to accomplish image analysis are distributed among the exploitation elements. Systems and programs listed here include both processing and exploitation elements.

Hanna Arendt wrote :"The Okhrana, the Czarist predecessor of the GPU, is reported to have invented a filing system in which every suspect was noted on a large card in the center of which his name was surrounded by a red circle; his political friends were designated by smaller red circles and his nonpolitical acquaintances by green ones; brown circles indicated persons in contact with friends of the suspect but not known to him personally; cross-relationships between the suspect's friends, political and nonpolitical, and the friends of his friends were indicated by lines between the respective circles.*^*' Obviously the limi- tations of this method are set only by the size of the filing cards, and, theo- retically, a gigantic single sheet could show the relations and cross-relation- ships of the entire population. And this is the Utopian goal of the totalitarian secret police. It has given up the traditional old police dream which the lie detector is still supposed to realize, and no longer tries to find out who is who, or who thinks what."

Multi-INT

SIGINT

IMINT

Other

National

Automatic Speech Recognition
Voice Identification

GISTER
PROPELLER
TAS
ECHELON
GALE
GRANDSLAM
Language Translation
Machine Translation
ESS

ALE
CAWS
DIEPS
ELT
IEC
IUBA
NES
RADIUS
RULER
SAIP

MPS

MPAS
TIPSTER

Joint

A2IPB
DAWS
JDISS
LASER
MATRIX
MINT
MDITDS
OIW
TMWS
TWS
CENTERBOARD
CHAINWORK
EWFAES
HEARTLEAF
LIBERTYCAP
PRIVATEER
PSTS
ROCKETEER
STRED
SEIGEL
WOLFERS
IESS

AIRTAPS
AVS
CARS
CIGSS
CIP
CSIL
IMACTS
ISSES
JSIPS
JMTK
PHOTOLS

DEWDROP
RAINDROP
TOPSCENE

DTTS
MT
NSES

Army

ASAS
DTES
JSTARS-GSM
Pathfinder
SIP
TES
THMT
Warlord
Warrior
AEPDS
EPDS
ETUT
RTIP
SSP-S
SSP-S(PI)
Top Gable
Top Gallant
Top Graphic
TCAC
TUT
DTSS
DTSS-B
DTSS-D
DTSS-MSIP
DTSS-QRMP
Eagle Vision II
ETRAC
FAISS
IDPS
IPDS
MIES
TIIP

Navy

NFN
OASIS
OBU
OED
OSIS
TES-N
ACCES
CCOP
SSEE
TCAC
TERPES
TRUMP
TSTAR
DIWS
JSIPS-N
NIEWS
TEG

Air Force

Broadsword
CONSTANT WATCH
HAVE STAR
MIGS
MSTS
PC-I3
Sentinel Byte
TCT Cell
COMPASS JADE
ICM
IMOM
LOOKING GLASS
PARSEC
ANG-GES
Anvil
CATIS
IESS
Eagle Vision
JSIPS-A
MVS
National Eagle
PINES
Senior Blade
USAF DIPS

Sources and Methods




NEWSLETTER
Join the GlobalSecurity.org mailing list