SIGINT Activity Designator

Last updated

A SIGINT Activity Designator (or SIGAD) identifies a signals intelligence (SIGINT) line of collection activity associated with a signals collection station, such as a base or a ship. For example, the SIGAD for Menwith Hill in the UK is USD1000. [1] SIGADs are used by the signals intelligence agencies of the United States, the United Kingdom, Canada, Australia and New Zealand (the Five Eyes). [2]

Contents

Snapshot of Boundless Informant global heat map of data collection Boundless Informant data collection - DNI.jpg
Snapshot of Boundless Informant global heat map of data collection

There are several thousand SIGADs including the substation SIGADs denoted with a trailing alpha character. Several dozen of these are significant. [3] The leaked Boundless Informant reporting screenshot showed that it summarized 504 active SIGADs during a 30-day period in March 2013. [4]

General format

A SIGAD consists of five to eight case insensitive alphanumeric characters. [5] It takes the general form of an alphanumeric designator normally composed of a two- or three-letter prefix followed by one to three numbers. Often a dash is used to separate the alphabetic and numeric characters in the primary part of the designator, but less frequently a space is used as a separator or the alphabetic and numeric characters are concatenated together. An additional alphabetic character can be added to denote a sub-designator for a subset of the primary unit, such as a detachment. Lastly, a numeric character can be added after the aforementioned alphabetic to provide for a sub-sub-designator.

In the examples below an X represents an alphabetic character and an N represents a numeric character that are part of the primary designator. Likewise, an x represents an alphabetic character and an n represents a numeric character that are part of a sub-designator. Here are valid generalized examples of SIGADs:

  • XX-N
  • XX-NN
  • XX-NNN
  • XX-NNNN
  • XXX-N
  • XXX-NN
  • XXX-NNN
  • XXX-NNNN
  • XX-Nx
  • XX-Nxn
  • XX-NNx
  • XX-NNxn
  • XX-NNNx
  • XX-NNNxn
  • XX-NNNNx
  • XX-NNNNxn
  • XXX-Nx
  • XXX-Nxn
  • XXX-NNx
  • XXX-NNxn
  • XXX-NNNx
  • XXX-NNNxn
  • XXX-NNNNx
  • XXX-NNNNxn

The first two characters show which country operates the particular SIGINT facility, which can be US for the United States, UK for the United Kingdom, CA for Canada, AU for Australia and NZ for New Zealand. A third letter shows what sort of staff runs the station. SIGADs beginning with US without a third letter are used for intercept facilities run by the NSA. [2]

PRISM SIGAD

One prominent SIGAD as of April 2013 is US-984XN, with an unclassified codename of PRISM. It is "the number one source of raw intelligence used for NSA analytic reports" according to National Security Agency sources in a document leaked by Edward Snowden. [6] The President's Daily Brief, an all-source intelligence product, cited SIGAD US-984XN as a source in 1,477 items in 2012. [7] The U.S. government operates the PRISM electronic surveillance collection program through NSA's Special Source Operations, an alliance with trusted telecommunications providers. [6]

SIGADs for spy ships

The declassified SIGAD for the USS Liberty (AGTR-5) was USN-855. [8] The USS Liberty incident occurred on 8 June 1967, during the Six-Day War, when Israeli Air Force jet fighter aircraft and Israeli Navy motor torpedo boats attacked the USS Liberty in international waters.

The USS Pueblo (AGER-2) was a technical research ship, which was boarded and captured by North Korean forces on 23 January 1968, in what is known as the Pueblo incident. The declassified SIGAD for the NSA Direct Support Unit (DSU) from the Naval Security Group (NSG) on the USS Pueblo patrol involved in the incident was USN-467Y. [9] The USS Pueblo, which officially remains a commissioned vessel of the United States Navy, [10] is the only ship of the U.S. Navy currently being held captive. [11]

Vietnam War SIGADs

The following are the Vietnam War-era declassified SIGADs from inside South Vietnam during the period of 1969 to 1975: [12]

  • USA-32 Danang
  • USA-522J Cam Ranh Bay
  • USA-561 Tan Son Nhuh
  • USA-562 Phu Cat
  • USA-563 Danang
  • USM-604 Nha Trang
  • USM-605 Camp Eagle
  • USM-607 Can Tho
  • USM-613 Nha Tranh
  • USM-616 Xuan Loc
  • USM-624 Long Thanh
  • USM-626 Bien Hoa
  • USM-628 Bien Roa
  • USM-631 Phouc Vinh
  • USM-633 Cu Chi
  • USM-634 Pleiku
  • USM-636 Di An
  • USM-638 Cam Ranh Bay
  • USM-645 Quang Tri
  • USM-649 Chu Lai
  • USM-653 Nha Trang
  • USM-704 Saigon
  • USM-794 Saigon
  • USM-808 Phu Bai
  • USN-414 Danang
  • USN-842 Phu Bai
  • USN-843 Danang

Some locations have multiple SIGADs due to different types of collection activities and/or collection at different times during the period. The SIGADs beginning with USA were operated by the United States Air Force's United States Air Force Security Service (USAFSS). The SIGADs beginning with USM were operated by the United States Army's Army Security Agency (ASA). Lastly, the SIGADs beginning with USN were operated by the United States Navy's Naval Security Group (NAVSECGRU). All three of these units have been merged into other units or inactivated. [12]

The above list consists of the higher-echelon SIGADs. It does not include the numerous miscellaneous and temporary detachments, or direction finding stations belonging to major units or sites unless that detachment or site was the only one stationed in South Vietnam. Many of the "dets" were short-lived, often formed to support ongoing MACV operations or forward deployments of combat operational or maneuver units. [12] These detachments usually were designated by a letter suffix attached to the higher-echelon SIGAD such as "USM-633J," which was a detachment of the 372d Radio Research Company, USM-633, supporting the United States Army's 25th Infantry Division. [12]

Supporting Southeast Asia SIGADs

The following declassified SIGADs were highly relevant to the Vietnam Campaign, but were located in areas outside of South Vietnam in Southeast Asia. [13]

Again, detachments are not listed separately. In the case of the USS Maddox, naval Direct Support Units (DSUs) used the SIGAD USN-467 as a generic designator for their missions. Each specific patrol received a letter suffix for its duration. The subsequent mission would receive the next letter in an alphabetic sequence. Thus, SIGAD USN-467N specifically designates the USS Maddox patrol involved with the Gulf of Tonkin incident. [14] [15]

Joint Base SIGADs

In November 2005, the US Congress performed a fifth round of Base Realignment and Closure. This 2005 law also created twelve joint bases by merging adjacent installations belonging to different services in an effort to reduce costs and improve efficiencies. [16] [17]

Joint bases with a primarily SIGINT mission have SIGADs that begin with USJ. A joint base would have a primary SIGAD in the general form of USJ-NNN, where NNN are numeric characters. An actual example is not given, since these units are currently active.

See also

Related Research Articles

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">Gulf of Tonkin incident</span> 1964 naval confrontation between North Vietnam and the United States

The Gulf of Tonkin incident was an international confrontation that led to the United States engaging more directly in the Vietnam War. It consisted of a confrontation on August 2, 1964, when United States forces were carrying out covert operations close to North Vietnamese territorial waters and North Vietnamese forces responded. The United States government falsely claimed that a second incident occurred on August 4, 1964, between North Vietnamese and United States ships in the waters of the Gulf of Tonkin. Originally, US military claims blamed North Vietnam for the confrontation and the ostensible, but in fact imaginary, incident on August 4. Later investigation revealed that the second attack never happened; the official American claim is that it was based mostly on erroneously interpreted communications intercepts. The National Security Agency, a subsidiary of the US Defense Department, deliberately skewed intelligence to create the impression that an attack had been carried out.

USS <i>Pueblo</i> (AGER-2) US Navy ship attacked & captured by North Korea in 1968

USS Pueblo (AGER-2) is a Banner-class environmental research ship, initially in service during World War II, then converted to a spy ship in 1967 by the United States Navy. She gathered intelligence and oceanographic information, in particular monitoring electronic and radio signals from North Korea. On 23 January 1968, the ship was attacked and captured by a North Korean vessel, in what became known as the "Pueblo incident", or alternatively, as the "Pueblo crisis".

<span class="mw-page-title-main">President's Daily Brief</span> Daily intelligence briefing for the U.S. President

The President's Daily Brief, sometimes referred to as the President's Daily Briefing or the President's Daily Bulletin, is a top-secret document produced and given each morning to the president of the United States; it is also distributed to a small number of top-level US officials who are approved by the president. It includes highly classified intelligence analysis, information about covert operations, and reports from the most sensitive US sources or those shared by allied intelligence agencies. At the discretion of the president, the PDB may also be provided to the president-elect of the United States, between election day and inauguration, and to former presidents on request.

<span class="mw-page-title-main">Central Security Service</span> United States Department of Defense government agency

The Central Security Service (CSS) is a combat support agency of the United States Department of Defense which was established in 1972 to integrate the National Security Agency (NSA) and the Service Cryptologic Components (SCC) of the United States Armed Forces in the field of signals intelligence, cryptology, and information assurance at the tactical level. In 2002, the CSS had approximately 25,000 uniformed members. It is part of the United States Intelligence Community.

<span class="mw-page-title-main">Technical research ship</span> Type of intelligence-gathering ship

Technical research ships were used by the United States Navy during the 1960s to gather intelligence by monitoring, recording and analyzing wireless electronic communications of nations in various parts of the world. At the time these ships were active, the mission of the ships was covert and discussion of the true mission was prohibited. The mission of the ships was publicly given as conducting research into atmospheric and communications phenomena. However, the true mission was more or less an open secret and the ships were commonly referred to as "spy ships".

<span class="mw-page-title-main">Spy ship</span> Ship intended to gather intelligence

A spy ship or reconnaissance vessel is a dedicated ship intended to gather intelligence, usually by means of sophisticated electronic eavesdropping. In a wider sense, any ship intended to gather information could be considered a spy ship.

<span class="mw-page-title-main">DESOTO patrol</span>

DESOTO patrols were patrols conducted by U.S. Navy destroyers equipped with a mobile "van" of signals-intelligence equipment used for intelligence collection in hostile waters. The USS De Haven became the namesake for these patrols. De Haven performed the first patrol off the coast of China in April 1962. The USS Agerholm carried out the first patrol to target North Vietnam in the Gulf of Tonkin in December 1962.

<span class="mw-page-title-main">United States Army Security Agency</span> Signals intelligence unit

The United States Army Security Agency (ASA) was the United States Army's signals intelligence branch from 1945 to 1976. The Latin motto of the Army Security Agency was Semper Vigilis, which echoes the declaration, often mistakenly attributed to Thomas Jefferson, that "The price of liberty is eternal vigilance."

Unit 8200 is an Israeli Intelligence Corps unit of the Israel Defense Forces responsible for clandestine operation, collecting signal intelligence (SIGINT) and code decryption, counterintelligence, cyberwarfare, military intelligence, and surveillance. Military publications include references to Unit 8200 as the Central Collection Unit of the Intelligence Corps, and it is sometimes referred to as Israeli SIGINT National Unit (ISNU). It is subordinate to Aman, the military intelligence directorate.

USS <i>Jamestown</i> (AGTR-3)

USS Jamestown (AGTR-3/AG-166) was an Oxford-class technical research ship acquired by the U.S. Navy for the task of "conducting research in the reception of electromagnetic propagations" (SIGINT).

<span class="mw-page-title-main">Signals intelligence operational platforms by nation</span>

Signals intelligence operational platforms are employed by nations to collect signals intelligence, which is intelligence-gathering by interception of signals, whether between people or between machines, or mixtures of the two. As sensitive information is often encrypted, signals intelligence often involves the use of cryptanalysis. However, traffic analysis—the study of who is signalling whom and in what quantity—can often produce valuable information, even when the messages themselves cannot be decrypted.

After the end of World War II, all the Western allies began a rapid drawdown of military forces, including those of signals intelligence. At the time, the US still had a COMINT organization split between the Army and Navy. A 1946 plan listed Russia, China, and a [redacted] country as high-priority targets.

<span class="mw-page-title-main">United States Air Force Security Service</span> Former signals intelligence service of the US Air Force

Initially established as the Air Force (USAF) Security Group in June, 1948, the USAF Security Service (USAFSS) was activated as a major command on Oct 20, 1948

<span class="mw-page-title-main">Turbulence (NSA)</span>

Turbulence is a United States National Security Agency (NSA) information-technology project started c. 2005. It was developed in small, inexpensive "test" pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers. The U.S. Congress criticized the project in 2007 for having similar bureaucratic problems as the Trailblazer Project.

Monitoring Station Designators were used by the United States Army Signals Intelligence Service to designate a specific signal intelligence monitoring station in order to allow analysts to understand the source and type of SIGINT they were analyzing. These were used as shorthand rather than writing or typing out the PLA, which consisted of the formal unit name and location of the unit who performed the signals collection.

<span class="mw-page-title-main">OAKSTAR</span>

OAKSTAR is a secret internet surveillance program of the National Security Agency (NSA) of the United States. It was disclosed in 2013 as part of the leaks by former NSA contractor Edward Snowden.

Digital Network Intelligence or DNI is a term used in the United States Intelligence Community that refers to "intelligence from intercepted digital data communications transmitted between, or resident on, networked computers."

This is a category of disclosures related to global surveillance.

<span class="mw-page-title-main">Operation Formation Star</span> US military operation in 1968 off North Korea

Operation Formation Star was the code name for the emergency re-deployment of U.S. Seventh Fleet warships to the Sea of Japan off the eastern coast of North Korea following that country's seizure of the USS Pueblo (AGER-2) in international waters on 23 January 1968.

References

  1. "INTERCEPTION CAPABILITIES - IMPACT AND EXPLOITATION: Paper 1 - Echelon and its role in COMINT" (PDF). 2001-01-23. Retrieved 2013-06-06.
  2. 1 2 Top Level Telecommunications: SIGINT Activity Designators
  3. "Ragtime: Code name of NSA's Secret Domestic Intelligence Program Revealed in New Book". Washingtonian . 2013-02-27. Retrieved 2013-06-11.
  4. Glenn Greenwald and Ewen MacAskill (2013-06-11). "Boundless Informant: the NSA's secret tool to track global surveillance data". The Guardian. Retrieved 2013-06-11.
  5. Dally, Kathy (22 September 2000). "ACP 133 Common Content and LDAP". IETF. Retrieved 2013-06-24.
  6. 1 2 "NSA slides explain the PRISM data-collection program". The Washington Post . 2013-06-06. Retrieved 2013-06-06.
  7. "Prism scandal: Government program secretly probes Internet servers". Chicago Tribune . June 7, 2013. Archived from the original on June 7, 2013.
  8. "Richard W. Hickman Interview" (PDF). 1980-04-30. p. 8. Retrieved 2013-06-12.
  9. "USS Pueble AGER 2: Background Information" (PDF). p. 10. Archived from the original (PDF) on 2013-09-18. Retrieved 2013-06-13.
  10. "Naval Vessel Register Web page on USS Pueblo – AGER-2". Nvr.navy.mil. Retrieved 13 June 2013.
  11. "List of active ships". Naval Vessel Register. NAVSEA Shipbuilding Support Office. Archived from the original on 4 February 2012. Retrieved 23 May 2013.
  12. 1 2 3 4 "Spartans in Darkness:American SIGINT and the Indochina war, 1945-1975" (PDF). 1998-02-24. p. 398. Retrieved 2013-06-11.
  13. "Spartans in Darkness: American SIGINT and the Indochina war, 1945–1975" (PDF). National Security Agency. 1998-02-24. pp. 498–500. Retrieved 2013-06-11.
  14. "Skunks, Bogies, Silent Hounds, and the Flying Fish: The Gulf of Tonkin Mystery, 2-4 August 1964" (PDF). 1996-02-24. p. 50. Archived from the original (PDF) on 11 October 2013. Retrieved 2013-06-11.
  15. William Gerhard (June 1969). In the Shadow of War (To the Gulf of Tonkin), Cryptologic History Series, Southeast Asia. National Security Agency. p. 51.
  16. "BRAC JOINT BASING LAW". 2008-05-13. Retrieved 2013-06-12.
  17. "DOD JOINT BASES: Management Improvements Needed to Achieve Greater Efficiencies" (PDF). November 2012. Retrieved 2013-06-12.