Open Source Intelligence: Special Ops In Syria Exposed

Source: Stratfor

An unparalleled, indiscriminate and growing wave of transparency is exposing the deployment of military assets—once found only through labored searches of technical publications—and high definition, near-real-time images of geographical locations worldwide, are obtainable through the click of a mouse.

As tensions rise between the United States and potential state and non-state adversaries, the veil of secrecy that at one time could only be lifted by intelligence agencies is now accessible to virtually anyone via the worldwide web.

Many news outlets picked up on the recent expansion of an airstrip in Remeillan, Syria, a Kurdish-controlled area 365 miles from NATO Incirlik air base in Turkey. The strip, that was just 2,300 feet long by 82 feet wide on April 17, 2015, has been expanded to 4,330 feet by 190 feet wide, with an 82 feet by 92 feet apron, as of December 18, 2015.

CNN placed a reporter on the ground to give an eyewitness account of the activities taking place near the strip—described as herdsmen with sheep, oil pumps, and mud brick houses. Yet, this leaves many unanswered questions.

Why does the expansion of an isolated airstrip warrant attention? It is not only the improvement of the airstrip, but also how it was discovered.

The construction was observed by IHS Jane’s, using commercial satellite imagery gathered, in this case, from Airbus Defence and Space, but which could be purchased from a number of sources for a few thousand dollars.

What are the deeper implications of this runway? Without taking a trip to Syria or accessing classified sources, can a person answer this question using only open sources?

Considering the old dimensions of the airstrip, the most functional American fixed-wing cargo aircraft with the technical capability to land at the strip is the C-27J. With a required runway length of 2,400 feet, it fits close to the specifications. Special Operations Command (SOCOM) took control of these planes in 2014 after they failed to meet air force requirements. Otherwise, only helicopters or V-22s could operate out of the old strip, a fact that has been reported by news sources.

This data comes without the burden launching and managing satellites, or gathering primary intelligence.

With the expanded dimensions of the strip, the most versatile airplane that could be used in this space is the C-130—a multi-role, long-range tactical aircraft. An assault landing, a technique used when faced with a short landing strip or when taking enemy fire it is likely, requires only a 3,000- by 60-foot airstrip.

The other aircraft capable of landing on this strip is the C-17—a cargo and transport aircraft larger than the C-130 that requires a 3,000- by 90-foot airstrip for an assault landing. Though landing either of these aircrafts was impossible on the old strip, it is well within the limits of the new field. A C-17 is more efficient at delivering cargo, but less flexible, and the air force prefers to use them for inter-theater transport.

As a baseline, the C-27J has a max payload of 25,000 pounds and can carry a Jackal, a versatile ground vehicle. So, what additional capabilities do the C-130 and C-17 provide, that are worth the effort of expanding an airstrip in remote Syria?

There are several capabilities the United States might want to have with these new platforms. The C-130 can now be parked on the apron and used as a force-multiplier to provide rapid ground refueling for helicopters, fast attack vehicles (FAVs), or Ospreys.

This C-130 could also be utilized for aeromedical evacuation, to bring in six FAVs, such as Flyers or Ranger Special Operations Vehicle, at a time, fly as part of a Unified Command Suite to coordinate efforts on the ground and provide a central link to fighters in the area, or drop off a High Mobility Artillery Rocket System (HIMARS) to provide a precision strike capability in northern Syria. If the military just wants to drop off supplies, a C-17 can deliver 73,000 pounds of equipment at a time with a 90-minute turnaround. Those pallets could carry in weapons, ammunition, light vehicles, drones, or other supplies.

Each set of capabilities is linked to a different mission. The higher payload capacity could provide increased material support for Kurdish Forces, faster refueling capabilities could better enable air operations to support allies on the ground, and FAVs could strengthen snatch and grab capabilities in the area.

A supporter of the self-declared Islamic State could use open-source information to perform this type of analysis full time.

Individuals can purchase commercial surveillance images of specific areas of concern. They are able to “roll back time,” looking at images from present to inception, to answer the questions of who, what, when, and where. The United States has repeated employed this strategy, both stateside and overseas, with satellites, blimps, and conventional airplanes. Following an improvised explosive device (IED) blast, or the murder of a law enforcement official, US authorities such as the National Geospatial-Intelligence Agency (NGA) often utilize imagery to track the parties involved.

An interested party can do this analysis from the comfort of their office without access to classified information, contacts on the ground, or even any database subscriptions. This data comes without the burden launching and managing satellites, or gathering primary intelligence.

While it’s nothing new that a Russian military intelligence unit could complete a comprehensive study of a Syrian airstrip, it is novel that a supporter of the self-declared Islamic State could use open-source information to perform this type of analysis full time.

They could now purchase satellite images to track similar scenarios and to inform grand strategy and prioritize targets. A radical jihadist version of Elliott Higgins, the British citizen journalist who has exposed Russian actions in Ukraine and Syria using open-source intelligence, would be a prized asset for any extremist group.

DefenseOne: http://bit.ly/1LzRVI0

« Dark Territory: The Secret History of Cyber War
World’s First Wearable Translator »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Radisys

Radisys

Radisys offers software, products, integrated systems, and professional services for communication service providers and telecom solution vendors.

Compumatica

Compumatica

Compumatica is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email encryption.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Octo

Octo

Octo, an IBM company, is a technology firm dedicated to solving the Federal Government’s most complex challenges, enabling agencies to jump the technology curve.

Boeing

Boeing

Boeing is the world's largest aerospace company and leading manufacturer of commercial jetliners, defense, space and security systems.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.

ioSENTRIX

ioSENTRIX

ioSENTRIX offers tailored, risk-focused assessments that reduce true business risk.

tmc3

tmc3

tmc3 is an award-winning, people-centric consultancy that is transforming cyber security from an overhead into an organisational enabler.

Arctera

Arctera

Arctera simplifies data management to keep you secure. Our company operates as three units - Data Compliance, Data Resilience, and Data Protection.

Vyntra Global

Vyntra Global

Vyntra is a global leader in transaction intelligence, formed from the merger of NetGuardians and Intix.