Intelligence-Programs-and-Systems情报程序和系统.doc
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- Intelligence Programs and Systems 情报 程序 系统
- 资源描述:
-
Intelligence Programs and Systems Core systems include both system architectures for intelligence systems and applications interoperability, as well as those technical standards and common infrastructure elements, such as operating systems, that support such interoperability. Tasking systems are used to direct and prioritize collection requirements, and form the interface between consumers and producers of intelligence products. Collection systems come from a variety of organizations, echelons, services, and intelligence disciplines. These include but are not limited to tactical ground-based IEW systems, unmanned aerial vehicles, and space systems. Processing systems receive, convert, and correlate information into a form usable as combat information or intelligence. These processors are found at all echelons of the intelligence architecture, and include both primary processing and secondary exploitation systems. Dissemination systems provide the communications links between collection systems, processors, and users. These include both the physical communications channels, as well as networks, protocols and software, and databases and servers for the staging of products for dissemination. Other programs is a catch-all residual category, which includes a variety of programs that appear to be intelligence-related but whose exact purpose and nature remains obscure. The List - An alphabetical listing of all the programs profiled here, as well as a few we haven't gotten around to yet, along with a few random codenames that will probably always bewilder us. Sources and Methods Where did we get all this "stuff"? Stovepiped INTS An alternative display of the various elements of the collection cycle profiled here, according to collection discipline [ie, IMINT, SIGINT, etc]. Core Intelligence Programs and Systems Core systems include both system architectures for intelligence systems and applications interoperability, as well as those technical standards and common infrastructure elements, such as operating and training systems, that support such interoperability. Architectures Standards Infrastructure National FCA FIA IOSA MDA TAP TENCAP TPED USIGS USIS USSS CIB DPPDB DTED FFD MSIIRS NIIRS NITFS NRIIS SIDR PLATFORM Soft Landing Breakthrough Groundbreaker Joint C4ISR DODIIS GCCS-I3 CUBIC DCGS DCIIS ICARIS IMP JAMA JASA JIVA OILSTOCK SENIOR SMART SOCRATES CROSSHAIR UNITARY DF CSE-SS CSP-HOL IC4I IHPS ITT MERIT SASS-II Army S&IPA TACSIM WIM Navy JMCIS JMICS-TM JMICS JMIOS IAS OSIS MAGIS CUB Air Force IDHS AFMSS MC2C SENTINEL II Intelligence Tasking Programs and Systems Tasking systems are used to direct and prioritize collection requirements, and form the interface between consumers and producers of intelligence products. Multi-INT SIGINT IMINT Other National COLISEUM JCMT CES POTS CAMS ESS NES RMS HARMONY MRDBS Joint AREAS GRIS IESS FORMMS ISP Army ETUT Navy IMPACTS Air Force ACC GOC Intelligence Collection Programs and Systems Collection systems come from a variety of organizations, echelons, services, and intelligence disciplines. These include but are not limited to tactical ground-based IEW systems, unmanned aerial vehicles, and space systems. Unmanned Aerial Vehicles Special Electronic Mission Aircraft (SEMA) Airships Multi-INT SIGINT IMINT Other Ground U-2 DGS UAV GCS UAV TCS AN/TSQ-108A RSSC CALEA AN/AX-16 AN/FLR-9 TROJAN CLASSIC CLASSIC BULLSEYE CLASSIC OWL CLASSIC WIZARD ENLARGER TIDYTIPS-III VCATS AHFEWS IEWCS GBCS MEWSS Prophet SANDCRAB TACFIX TEAMMATE TRACKWOLF TRAFFICJAM TRAILBLAZER Segment Upgrade CHASIS CHATS CHIMS CI/HUMINT Argus Steel Eagle Steel Rattler AEOS AMOS COBRA DANE HAVE STARE GEODSS Starfire HAARP STAR GATE Sea BARNACLE HOLYSTONE SEAL SDV SEAL ASDS AN/SRS-1 Combat DF AN/ULR-21 AN/WLR-2 ESM SSN AN/WLR-3 ESM SSN AN/WLR-4 ESM AN/WLR-6 ESM AN/WLR-7 ESM AN/WLR-8 AN/WLR-10 ESM AN/WLR-11 ESM AN/WLR-13 EO ESM AN/WLR-14 Seascout AN/WLR-15 ESM AN/WLR-16 Phoenix AN/WLR-18 ESM NSSN ESM / ASTECS CLASSIC CENTERBOARD CLASSIC FLAGHOIST CLASSIC OUTBOARD CLASSIC TROLL AGER 2 Pueblo Cluster Knave AN/BQH-5 AN/WLR-5 ACINT AN/WLR-9 ACINT AN/WLR-12 ACINT AN/UQQ-2 LFA AN/UQQ-2 SURTASS IUSS ADS FDS SDS SOSUS T-ARC 7 Zeus UUV AMPS ATV AUSS BPAUV CURV Flying Plug Odyssey RUWS TUWVS Project Jennifer Glomar Explorer COBRA GEMINI COBRA JUDY COBRA JUDY Replacement GREY STAR Radiant Mist Air ACS ARL RG-8 Condor RU-38 Twin Condor U-125 Blue Devil Creek Sand Desert Owl Horned Owl/ARMS MARSS EMARSS Radiant Falcon Redridge Shadow Harvest Tusker Sand Tusker Wing AQM-34 Firebee BAMS AQUATONE AQUILINE COMPASS ARROW COMPASS BIN COMPASS COPE COMPASS DAWN SENIOR BOWL [D-21] SENIOR CROWN [SR-71] SENIOR GUARDIAN SENIOR YEAR [U-2] TAGBOARD Kingfish Suntan High Altitude Airship A-170 Airship JSAF ADARS BIG SAFARI CHAALS COMBAT SENT EA-3 EA-6B Prowler EC-130E SENIOR SCOUT EC-130H RIVET FIRE EP-3E ARIES II EP-3 REEF POINT ES-3A Shadow EH-60L Quickfix MC-12W Liberty CEFIRM Leader / Crazy Dog CEFLY Lancer Crazy Horse Laffing Eagle Left Foot Left Jab Guardrail Guardrail/Common Sensor Quicklook RIVET AMBER RIVET BALL RIVET BRASS RIVET CARD RIVET FIRE RIVET JOINT RIVET QUICK SENIOR GLASS SENIOR HUNTER SENIOR RUBY SENIOR SCOUT SENIOR SPEAR SENIOR TROUPE SENIOR WARRIOR SAR GMTI FOPEN LIDAR Angel Fire ARGUS-IS Gorgon Stare Constant Hawk Highlighter Night Eagle Scathe View BuckEye Saturn Arch ASARS-I ASARS-II ATARS BIAS IFSARE JPSD LSRS MP-RTIP PACER COIN PRS SHARP TARPS TARS AGS E-8 Joint STARS E-10 MC2A F-11 F-12 Rainbow F-13 O-1 Bird Dog O-2 Skymaster O-3 Quiet Star OA-37 OC-130 KEEN SAGE OC-135 Open Skies OV-1 Mohawk OV-10 Bronco RA-5 RB-29 RB-45 RB-47 RB-57 RB-66 RC-26B RC-130S RF-4B/C RF-101 R-11 R-12 Rainbow R-16 JSTARS TACIT BLUE MAV UAVs A160 Hummingbird Aquila Pointer CR-TUAV CR-UAV Cypher Cypher II Desert Hawk Dragon Dragon Eye Dragon Warrior Exdrone FCS HALE FCS OAV FCS SUAV FCS TUAV Firebee VT-UAV VT-UAV Dragonfly VT-UAV Eagle Eye VT-UAV Vigilante VT-UAV Guardian SR-UAV Pioneer SR-UAV Hunter T-UAV Outrider T-UAV Shadow T-UAV GNAT-750 Lofty View MAE-UAV Predator Model 324 Model 410 MR-UAV MRE Nite Panther HAE-UAV GlobalHawk HAE-UAV DarkStar SEA FERRET TESAR Raven BEARTRAP Balloons COBRA BALL COBRA EYE CONSTANT PHOENIX FISTA Radiant Argon Radiant Brass Radiant Outlaw TAWS O-5 SEMA RC-12 SEMA RU-21 SEMA Space Vortex-II Orion-II Trumpet EIS ISFAR Keyhole Lacrosse Discoverer II Overhead Non-Imaging Infrared (ONIR) SBWASS COBRA BRASS HERITAGE DSP NDS Intelligence Processing Programs and Systems Processing systems receive, convert, and correlate information into a form usable as combat information or intelligence. These processors are found at all echelons of the intelligence architecture, and include both primary processing and secondary exploitation systems. In some architectures, such as USIS 2000, the term processing is limited to those functions needed to convert imagery data into a scene contiguous pixel format. All other operations with the pixels are considered image analysis. Applications to accomplish image analysis are distributed among the exploitation elements. Systems and programs listed here include both processing and exploitation elements. Multi-INT SIGINT IMINT Other National Automatic Speech Recognition Voice Identification GISTER PROPELLER TAS ECHELON GALE GRANDSLAM Language Translation Machine Translation ESS ALE CAWS DIEPS ELT IEC IUBA NES RADIUS RULER SAIP MPS MPAS TIPSTER Joint A2IPB DAWS JDISS LASER MATRIX MINT MDITDS OIW TMWS TWS CENTERBOARD CHAINWORK EWFAES HEARTLEAF LIBERTYCAP PRIVATEER PSTS ROCKETEER STRED SEIGEL WOLFERS IESS AIRTAPS AVS CARS CIGSS CIP CSIL IMACTS ISSES JSIPS JMTK PHOTOLS DEWDROP RAINDROP TOPSCENE DTTS MT NSES Army ASAS DTES JSTARS-GSM Pathfinder SIP TES THMT Warlord Warrior AEPDS EPDS ETUT RTIP SSP-S SSP-S(PI) Top Gable Top Gallant Top Graphic TCAC TUT DTSS DTSS-B DTSS-D DTSS-MSIP DTSS-QRMP Eagle Vision II ETRAC FAISS IDPS IPDS MIES TIIP Navy NFN OASIS OBU OED OSIS TES-N ACCES CCOP SSEE TCAC TERPES TRUMP TSTAR DIWS JSIPS-N NIEWS TEG Air Force Broadsword CONSTANT WATCH HAVE STAR MIGS MSTS PC-I3 Sentinel Byte TCT Cell COMPASS JADE ICM IMOM LOOKING GLASS PARSEC ANG-GES Anvil CATIS IESS Eagle Vision JSIPS-A MVS National Eagle PINES Senior Blade USAF DIPS Sources and Methods § An Evaluation of Required Tools for the Imagery Analyst ADROIT SYSTEMS - OCT 1997 § RIGS Users' Group/CIGSS IPT Conference Briefing Download Area § Terrain Visualization Division Hardware / Software Survey of Visualization Products Intelligence Dissemination Programs and Systems Dissemination systems provide the communications links between collection systems, processors, and users. These include both the physical communications channels, as well as networks, protocols and software, and database and servers for the staging of products for dissemination. Multi-INT SIGINT IMINT Other National ACBDU ADNET CDIS CDL CIRAS EMERALD FASTLANE GBS JBS Intelink SAFE TCDL NSD NIMA Libraries IPA IPL DDS RL RE DE NDS MDS NIS 5D IDEX-II IRP NIMA Softcopy RADIANT MERCURY RADIANT TIN SIDEARM ARGUS CIRC NTSDS OSIS Joint JWICS GIG GIG-BE JC2 CMSRR DATM DAWN DCPDB DCS DDN DISN DoDIIS DISSEM DSNET GSD IDB JMIE JMIE/JEM JRICP LOCE MDITDS MIDB RCEP SIPRNET TADIL AMHS CSP CTT JTT MAXI MIIDS MINS RADIANT CLEAR RADIANT HAIL RTPS SOF-IV IBS JION ANCHORY BINOCULAR EWIRDB HOST KILTING NEWSDEALER NEWSTAND STREAMLINER SDS SOMMS TOUCHBACK WRANGLER INNET MEPED PLATYPUS SPIRIT MATT TADIXS TDDS TIBS TRAP TRE TRIXS SENIOR SPAN SENIOR SPUR Chariot ISSE GUARD JSIPS-TFT-C MTN RADIANT TIN SIDS HOCNET PLATYPUS RADIANT IVORY Army JTT-H3 MIST SUCCESS TENCAP CSP TROJAN ESE TROJAN LITE TROJAN SPIRIT II TROJAN TATERS TROJAN TMRRS TROJAN TTMS FAST MITT SSP-S TENCAP GUARD TROJAN BARE TRRIP Navy BGPHES CDL-N CHBDL-ST CLASSIC OPINTEL Nova OPINTEL SI SSIXS TACINTEL II+ TADIXS CCBD CLASSIC TRUMP CLARINET MERLIN JEWELER SEAMARK TERPS MAGTF SIDS N-TIS Air Force ABI ABIT CIS CONSTANT SOURCE MP-CDL RTIC TGIF "Other" Intelligence Programs and Systems Other programs is a catch-all residual category, which includes a variety of programs that appear to be intelligence-related but whose exact purpose and nature remains obscure. For the most part the programs listed here are derived from the DTIC Records for Automated Information Systems with no additional identifying information. An Automated Information System (AIS) can be functionally described as a combination of computer hardware and computer software, data and/or telecommunications, that performs functions such as collecting, processing, transmitting, and displaying information. Excluded are computer resources, both hardware and software, that are: physically part of, dedicated to, or essential in real time to the mission performance of weapon systems; used for weapon system specialized training, simulation, diagnostic test and maintenance, or calibration; or used for research and development of weapon systems. Based on other similar records in this list, such as ANCHORY, GISTER, HARMONY and WRANGLER, it is reasonable to assume that this program is an intelligence related automated information system. However, pending elicitation of further details, it is listed as an "Other" program and an "Other" agency. Some of these programs may be boring plain vanilla Defense Department activities, but most are probably not. Since the NSA generally seems to tend to get its program names from the same folks who dream up names for new automobiles, most [but not all] of these programs are probably NSA-related. Other Other CLASSIC AERIE COALESCE CUAD/KINSFOLK ENGRAFT GADGETEER GALIDIA GATCHWORK GUESTMASTER GLADLY GOLDPOINT GUNSHOT HYBRID INTEGRA JAGUAR KEELAN KLONDIKE KNOCKDOWN II MARTES ORCHESTRA PACESETTER PINWALE QUICKSILVER RUNBACK SKYWRITER SUNSHINE/JEAP TEAS展开阅读全文
咨信网温馨提示:1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前可先查看【教您几个在下载文档中可以更好的避免被坑】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时联系平台进行协调解决,联系【微信客服】、【QQ客服】,若有其他问题请点击或扫码反馈【服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【版权申诉】”,意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:0574-28810668;投诉电话:18658249818。




Intelligence-Programs-and-Systems情报程序和系统.doc



实名认证













自信AI助手
















微信客服
客服QQ
发送邮件
意见反馈



链接地址:https://www.zixin.com.cn/doc/12013158.html