Open Source Intelligence: Special Ops In Syria Exposed

Source: Stratfor

An unparalleled, indiscriminate and growing wave of transparency is exposing the deployment of military assets—once found only through labored searches of technical publications—and high definition, near-real-time images of geographical locations worldwide, are obtainable through the click of a mouse.

As tensions rise between the United States and potential state and non-state adversaries, the veil of secrecy that at one time could only be lifted by intelligence agencies is now accessible to virtually anyone via the worldwide web.

Many news outlets picked up on the recent expansion of an airstrip in Remeillan, Syria, a Kurdish-controlled area 365 miles from NATO Incirlik air base in Turkey. The strip, that was just 2,300 feet long by 82 feet wide on April 17, 2015, has been expanded to 4,330 feet by 190 feet wide, with an 82 feet by 92 feet apron, as of December 18, 2015.

CNN placed a reporter on the ground to give an eyewitness account of the activities taking place near the strip—described as herdsmen with sheep, oil pumps, and mud brick houses. Yet, this leaves many unanswered questions.

Why does the expansion of an isolated airstrip warrant attention? It is not only the improvement of the airstrip, but also how it was discovered.

The construction was observed by IHS Jane’s, using commercial satellite imagery gathered, in this case, from Airbus Defence and Space, but which could be purchased from a number of sources for a few thousand dollars.

What are the deeper implications of this runway? Without taking a trip to Syria or accessing classified sources, can a person answer this question using only open sources?

Considering the old dimensions of the airstrip, the most functional American fixed-wing cargo aircraft with the technical capability to land at the strip is the C-27J. With a required runway length of 2,400 feet, it fits close to the specifications. Special Operations Command (SOCOM) took control of these planes in 2014 after they failed to meet air force requirements. Otherwise, only helicopters or V-22s could operate out of the old strip, a fact that has been reported by news sources.

This data comes without the burden launching and managing satellites, or gathering primary intelligence.

With the expanded dimensions of the strip, the most versatile airplane that could be used in this space is the C-130—a multi-role, long-range tactical aircraft. An assault landing, a technique used when faced with a short landing strip or when taking enemy fire it is likely, requires only a 3,000- by 60-foot airstrip.

The other aircraft capable of landing on this strip is the C-17—a cargo and transport aircraft larger than the C-130 that requires a 3,000- by 90-foot airstrip for an assault landing. Though landing either of these aircrafts was impossible on the old strip, it is well within the limits of the new field. A C-17 is more efficient at delivering cargo, but less flexible, and the air force prefers to use them for inter-theater transport.

As a baseline, the C-27J has a max payload of 25,000 pounds and can carry a Jackal, a versatile ground vehicle. So, what additional capabilities do the C-130 and C-17 provide, that are worth the effort of expanding an airstrip in remote Syria?

There are several capabilities the United States might want to have with these new platforms. The C-130 can now be parked on the apron and used as a force-multiplier to provide rapid ground refueling for helicopters, fast attack vehicles (FAVs), or Ospreys.

This C-130 could also be utilized for aeromedical evacuation, to bring in six FAVs, such as Flyers or Ranger Special Operations Vehicle, at a time, fly as part of a Unified Command Suite to coordinate efforts on the ground and provide a central link to fighters in the area, or drop off a High Mobility Artillery Rocket System (HIMARS) to provide a precision strike capability in northern Syria. If the military just wants to drop off supplies, a C-17 can deliver 73,000 pounds of equipment at a time with a 90-minute turnaround. Those pallets could carry in weapons, ammunition, light vehicles, drones, or other supplies.

Each set of capabilities is linked to a different mission. The higher payload capacity could provide increased material support for Kurdish Forces, faster refueling capabilities could better enable air operations to support allies on the ground, and FAVs could strengthen snatch and grab capabilities in the area.

A supporter of the self-declared Islamic State could use open-source information to perform this type of analysis full time.

Individuals can purchase commercial surveillance images of specific areas of concern. They are able to “roll back time,” looking at images from present to inception, to answer the questions of who, what, when, and where. The United States has repeated employed this strategy, both stateside and overseas, with satellites, blimps, and conventional airplanes. Following an improvised explosive device (IED) blast, or the murder of a law enforcement official, US authorities such as the National Geospatial-Intelligence Agency (NGA) often utilize imagery to track the parties involved.

An interested party can do this analysis from the comfort of their office without access to classified information, contacts on the ground, or even any database subscriptions. This data comes without the burden launching and managing satellites, or gathering primary intelligence.

While it’s nothing new that a Russian military intelligence unit could complete a comprehensive study of a Syrian airstrip, it is novel that a supporter of the self-declared Islamic State could use open-source information to perform this type of analysis full time.

They could now purchase satellite images to track similar scenarios and to inform grand strategy and prioritize targets. A radical jihadist version of Elliott Higgins, the British citizen journalist who has exposed Russian actions in Ukraine and Syria using open-source intelligence, would be a prized asset for any extremist group.

DefenseOne: http://bit.ly/1LzRVI0

« Dark Territory: The Secret History of Cyber War
World’s First Wearable Translator »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

HumanFirewall

HumanFirewall

HumanFirewall makes it possible for every individual to take part in securing their organisation. With HumanFirewall, achieving security has never been easier.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

Focal Point

Focal Point

We aspire to be the focal point for Medium and Small size companies providing 24/7 cyber security advice, services and solutions.

Thoma Bravo

Thoma Bravo

Thoma Bravo is a leading private equity firm with a 40+ year history and a focus on investing in software and technology companies.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

Nerds On Site

Nerds On Site

Nerds On Site provide on-site & in-home IT and technical support, managed IT services, and cyber security through our collaborative team of highly-trained IT and Security professionals.

Corix Partners

Corix Partners

Corix Partners is a Boutique Management Consultancy Firm focused on assisting CIOs and other C-level executives in resolving Cyber Security Strategy, Organisation and Governance challenges.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.

QRC Assurance & Solutions

QRC Assurance & Solutions

QRC is a PCI QSA, QPA, ISO accredited, CPA and CERT-IN empanelled organization with vast experience in conducting certification, regulatory audits, pen testing services, training and more.