The term "cold war" refers to a period in history during which major countries such as the United States and the Soviet Union competed militarily and politically. The cold war period of 1974-1991 was followed by the significant, impacting decades of years ahead globally. Warfare such as the Korean War and the Vietnam War happened during this time period. However, the cold war was given the name ""cold"" because no mass destruction occurred, but rather the two adversaries were involved in the preparation of war strategies and weapons. The cold war was essentially based on perception between the two organized systems namely the communism and the capitalism. Communism was integrated within the Russian's society and politics beginning from Independence while capitalism was present within the American beliefs. Hence the cold war did not just involve politics, but indeed it belonged to each American and Russian. During this time both nations arranged for nuclear war that could also be termed as world war III. During the preparation of the nuclear war, a lot of focus was placed on many disciplines of intelligence by both nations. Consequently, a lot of intelligence was experienced across the globe which impacted drastically on all countries worldwide. These effects had both positive and adverse outcome upon the people of the Soviet Union, America and worldwide. Intelligence had adverse effects since its aim was not t provide national security. Data refers to the monitoring of secret agents who are obeying instructions of the enemies.
The advancement of Cold War affected the growth of civilization which discovered the warning of nuclear war. Following World War II, there was a lot of technological progress which offered the development of mass consumerism, huge advancement in medicine, the arrival of television, advent of the worldwide phone system, jetliner progression, and construction of superhighway, computer development, the Space Race and numerous other realizations. Even though the broader region of the globe existed in impoverishment and did not have technological progression, America and other Western nations achieved economic development. The Cold war which commenced in 1945 projected the heightened role of technological advancement within the formation of economic links between two super powers. The purpose of this paper is to compare and contrast the impact of technology on the discipline of imagery intelligence during the cold war and after the cold war.
Impact of Technology on Imagery Intelligence during Cold War
Imagery Intelligence (IMINT) constitutes a discipline of intelligence gathering which involves gathering data using aerial photography and satellite. As a way of assembling intelligence, IMINT represents a subcategory within the intelligence collection management. Sequentially, it is a category of intelligence cycle management. The Cold War period witnessed Soviet build strategic capacity which propelled the American Intelligence group's needs. Consequently, diplomatic avenues like the SR-71 and the U-2 reconnaissance aircraft developed. This process heightened altitude in which human crew collection channels were mainly created to offer access to rejected territory majorly for collecting photographic material. Designed confidentially, the U-2 acted as a means of gaining information regarding the surfacing strategic systems of the Soviet. In 1995, President Eisenhower suggested an international "Open Skies" policy which required arms of agreements to be endorsed by mutual inspection. Upon the rejection of this policy by the Soviet Union, the country initiated its U-2 over-flights in early 1956.When one of these aircraft was lost to the Soviet Union during1960; it resulted from a global incident. The U-2 planes served a significant purpose during the Missile Crisis in Cuba. The comparatively powerful SR-71 formerly designed like the A-12 through a program of CIA attained operational ability during the 1960s and functioned in the Viet Nam War as well as in other several regions of the globe to gather good imagery up to its withdrawal in 1990s.The utilization of spacecraft to collect imagery from restricted areas eradicated the risk of attack upon airborne networks but resulted in a more costly and complicated collection structure. Spacecraft are confined to very foreseeable and permanent orbits. It is possible to optimize an orbit for the purpose of maximizing coverage; however altering the orbit of the spacecraft to match a different threat becomes very challenging or impossible due to the laws of science. It is possible for an aircraft to delay or maneuver its departure due to poor weather. However, a spacecraft is confined to the pre-determined path of orbit. Additionally, many photographs captured from space indicate nothing except a cover of cloud that obstructs the target. Pictures captured during cold war using their technology also experienced poor quality unlike to the coverage of aircraft, nonetheless improving technology has applied skills in handling the problem, and the issues were resolved after the Cold War
Impact of Technology on Imagery Intelligence after Cold War
Twenty years after the cold war improvements in technology contributed significantly to improving the world of imagery intelligence both in the process and the threat of environment. Technology has equipped opponents with the capacity to create virtual communities which gradually destroy the power of a nation. It has made it easy to steal secrets and to spread speculative information across long distances. Countries no longer monopolize information. Improvement in technology has facilitated imagery to contribute significantly towards supporting tactical battlefield; unlike the majorly strategic responsibility it held in times of the cold war. Additionally, the integration of digital maps, GPS data and real-time imagery in Geographical Information Systems resulted in another discipline known as "geospatial intelligence," hence transforming military control and command. The Gulf War during 1991 signaled these changes by using vehicles without human crews for reconnaissance. This operation was the first commercial application of precision-guided munitions (PGMS) as well as the skillful utilization of satellite radar and modern JSTARS aircraft. Improvement in technology has allowed encouraged imagery to contribute significantly in supporting accomplished battlefield. There was a significant effect of the war because enemies were unable to function on American terms. The American airpower compelled war planners in Chinese to prioritize C4ISR in their strategy of modernizing their military. Other countries including China started to transfer their military leadership, Missiles, and Weapons of Mass Destruction (WMD) to underground. Unlike during Cold War where satellites followed targets like warships and airfields, post-Cold War opponents were low contrast. It was challenging for satellites to identify deals of arms within training camps, minute fast moving convoy, rifle ranges or village square. Military commanders resorted to aerial surveillance, progressively unmanned, depending on satellites often for secure communication and navigation. Sensors for full motion video were established upon UAVs within Balkans during 1995.the introduction of the moving videos brought enhanced spatiotemporal awareness. Ten years later, this ability was polished by the US Army program called "Constant Hawk" to support forensic retracing of Iraq's EID attacks. Arming the UAVS has been the major significant growth. Disappointed by the inadequateness of strikes of cruise missile while retaliating for the Al Qaeda bombings in 1998 within Africa, the American Forces and the CIA collaborated thereby arming the Predator UAV using Hellfire missiles.
Advanced Technology has enabled advanced sensors to be facilitated to adequately support exceptional undertakings as well as counteracting proliferation, narcotics, and camouflage. The technology of night-vision has benefited conventional forces through operations in the desert and during raids by outstanding forces. Laser intelligence has turned out to be an important part of the "kill' chin of the American power. A significant impact was felt during the 20th-century air-ground warfare, particularly, when laser designators were used by forwarding air managers to "paint" targets for missiles in search of the laser. Nonetheless, in spite of remarkable studies, the most efficient way to unambiguous exposing and distinguishing toxic materials is yet to be realized. Improvements in particle physics and cosmic ray are not yet integrated within nuclear detectors. With the expansion of robotics, it has not been successful to detect improvised explosive devices by exotic technologies. Some additional enhancement has been affected. Polymerase chain reaction (PCR) technology which was launched in 1983 was adopted in 1996 by UN inspectors as the standard way of unearthing biological agents. The technique was used to conquer Iraqi refusal of the anthrax program after which it transformed to perform "real-time" determination of pathogens. However, majority of pathogens do not produce an odor or show color that can be detected, leading to attackers to consider pre-attack scrutiny as impractical. The launch of fingerprints and photographic material within programs like US-VISIT caused such dissemblance to become more challenging. Also, the creation of handled processes for gathering biometrics has shown to be effective in preserving achievements in counterinsurgencies. The link between fingerprints captured overseas with databases applied by immigration in the US has revealed renowned terrorists and hindered American foes from accessing the country. Forensic scientists have used the latent fingerprints to trace where bombs are made. Profiling of DNA introduced in 1983 has impacted forensic in a big way making it easy for the resolution of many criminal cases. Even in the absence of an actual match, familiar DNA testing and genetic typing has been helpful in tracing rapist and serial killers.
The external effect of technology
The internet introduced a modern cyber region to the current contested spaces of the sea, land, and air. This apparently solid medium of communication has changed the threat territory in various ways. First, a modern way of sabotage has been created. Weapons of cyber can distort the control systems and command of decision-makers like it was demonstrated in the case of Russian charges in Georgia and Estonia in 2007.The Weapons can also distort industrial control systems as evidenced by the 2010 advanced America and Israel "Stuxnet" war on Iranian centrifuge. Secondly, the current region has simplified the mobilization of de-territorialized groups competent of challenging religious and state supremacy. Thirdly, cyberspace is currently considered as a virtual haven for insurgents and terrorists, an area where funds can be raised to enlist and teach members, arrange and plan attacks and broadcast the outcomes with impunity. Lastly, it has enabled the formation of spy heavens for mischievous players who rob vast quantities of information while staying anonymous. The cyber domain provides a huge target for criminals. For instance, America spends more than 400 billion US dollars every year on R&D which is the biggest so far within the developed world. Because a lot of the intellectual capital out of this investment is currently kept on networked terminals, American competitive advantaged benefited from a lot of studies can disappear immediately.
The internet has created an opportunity for advanced remote theft. Information can be obtained via direct "hacking," "Trojan horse "or trapdoors that are pre-installed. These processes utilize familiar system susceptibilities. During the Post-Cold War, the Chinese are considered the world's persistent and super active perpetrators of economic intelligence. They have gathered a vast range of American protection technologies through information. The success of Chinese is as result of massive recruits, grant fund studies, and long-term arrangements. While China depends on domains with the network to perform most of their military operations, they have progressively sought to use cyberspace for industrial operations. Information technology has gradually destroyed the monopoly of state's organizations previously enjoyed over ESPA NIO GE. Public use of search engines, database, and internet technology implies that the state analysts currently need to compete with NGOs, academics, and media. Apparently, internet and satellite technologies from history have been utilized for commercial purposes. What makes the post-Cold War period remarkable is that economic forces have driven the democratization of appropriate technologies like encryption and satellite imagery that were previously kept only for the privacy of intelligence. As this deregulation gain millions, radical can today fully utilize concealed data and Google Earth to prepare attacks. Transparency has been created through the democratization of ICT, making it challenging to preserve and reduce the effectiveness of intelligence organizations. During 2010, an analyst of Army intelligence based in Baghdad downloaded over 750 million American diplomatic cables which he sends to them to Wiki leaks. This occurrence, perhaps the most enormous illegal revelation of sensitive information in the history of US, demonstrates the level of which technology managed to equip intelligence.
Besides technology, there have been other drivers of transparency such as the need to prevent current threats and higher anticipations regarding liability. World politicians ought to explain the application of force preemptively by unearthing ESPA NIO GE. Collin Powell's considerable address during the UN meeting in 2002 was a world example of in the intelligence used publicly during post-Cold War. The internal effect of technology has essentially remodeled the information system. Champions during 1990 recommended the replacement of assembly line created during the industrial age with a modern approach. The way to go was to adopt open architectures, print and endorse protocols and circulate database potentials of the data revolution. These hopes were provided with new impetus following the revelation that the FBI and CIA had not succeeded in distributing information regarding the attacks run-up. A decade later, in spite of continuing bureaucratic opposition, the Marble Foundation president reported remarkable progress. The distortion of various terrorist plans during the previous decade illustrates vivid improvement within inter-organization sharing. Some people are not convinced that sharing has brought security to the US. Paul Redmond who was in charge of the investigation in searching for Aldrich Ames warned that careless exchange of data and information would certainly simplify the enemy's work and make it difficult to detect and neutralize them. The general rise in accountability has caused other factors of intelligence involved. Building efficient and thick cover by the use of "backstopping" which will hold up to an extensive electronic investigation is more challenging than before. During a period of constant scrutiny, covering sponsorship of secret undertakings is also proving difficult, as illustrated by the significant videos of Dubai Mossad murder of Mahmoud al-Mabhouh in 2010.The victim was a paramilitary of Hamas.
The less important side of technology has caused tradecraft and spy handing a lot safer and easier. People who have the ability access to private information can be recognized. Furthermore, their vulnerabilities can be determined by digging through spending habits, credit histories, chat rooms and social networks. It is no longer important for people who handle spies to meet them directly in safe places but can communicate with them virtually through secure video casting. Private documents which were filmed and dead-dropped in Cold War can now be imaged and send electronically. Simple disguised memory cards decrease the necessity for bargain devices to conceal film or different writing material. A covert communication used during Cold War that involved car tosses and risky brush passes can today be completed very quickly through the internet. However, on overall, technology has not simplified analysis. The outburst of information causes difficulty in differentiating actual signal from noise. Analysts cannot merely manage the outpouring imagery intelligence gathered through UAVs. The challenge is specifically acute within the signals intelligence.
Besides reconstructing their collection structures to match with fiber optics revolution, organizations are struggling to solve the problem of volume. With a previous data secret, groups can gather targeted close in intelligence. They can use the triangulation process with an identifier to geo-locate signal origins from mobile phones, satellite and radio signals. They can also use a voiceprint to track communication from the enemy. Or they can apply 'link analysis" or "call chaining' to trace accomplices. In the absence of lead, nonetheless, organizations have to resort to information mining, thereby creating civil liberty concerns. During the past decade, UK US decided to nullify and restore Orwellian state programs, set up to collect and, preserve secret public information, with mini, a lot of private-sector programs. During 2009, the public was reminded by the Christmas holiday terrorist that there was the need for sophisticated analytic devices that are now familiar with the military and the law enforcement analysts. To match the outburst of digital data being seized by detectives, it has been necessary to develop modern devices to perform 'digital forensics.
Conclusion
The period during the Cold War was characterized by geopolitical anxiety between two superpowers namely, United States and the Soviet Union. It was referred t as "cold "due to the absence of direct mass attacks between the two powers involved. Espanioge in Cold War relates to the collection of intelligence operations during the war. The two opponents depended widely on civilian and military organizations, and technology was very crucial in their undertakings. These groups contributed significantly in gathering information regarding tracking of spies and analyzing various disciplines of intelligence one of which is imagery intelligence. This work sought to compare and contrast the effect of technology on imagery intelligence between during old War and after Cold War.
The effect of technological revolutions on information undertakings is usually examined. However, the impact of technological transformation as such on intelligence operations is still not well known. The previous literature on the subject on technological advancement on the disciplines of intelligence is not standard. It is characterized by detailed explanations about individual elements, however with surprisingly hardly any focus on bigger trends and their implications. This has a twofold importance. First people do not fully understand analog innovation in intelligence during Cold War. Second, there are some clues for mastering another motion of technological transformation taking place within the intelligence disciplines after the Cold War. Observing the second change with the background of the first may provide us with vital signs to anticipate in future. Technology has impacted and will progressively impact on the practice of intelligence and potentials.ICT was the primary drive in the imagery intelligence during Cold War. The most visible effects were the techniques applied in gathering information. Essential transformations within communication, particularly during the launch of radio during Cold War, introduced the opportunity for "real time" intelligence. The Imagery intelligence discipline emerged and thrived during Cold War and persisted after the period when technology was more advanced than before the Cold War.
References
Garthoff, Raymond L. Soviet Leaders And Intelligence. Washington, DC: Georgetown University Press, 2015.
McCaslin, Leland C. Secrets Of The Cold War. Havertown: Helion & Co., 2010.
Morrison, John N.L. "Intelligence In The Cold War". Cold War History 14, no. 4 (2014): 575-591.
Richelson, Jeffrey T. "Strategic Intelligence In The Cold War And Beyondjefferson Adams, Strategic Intelligence In The Cold War And Beyond. London: Routledge, 2015. 166 Pp. $135.00 Cloth, $34.95 Paper.". Journal of Cold War Studies 17, no. 3 (2015): 286-287.
Warner, Michael. "Reflections On Technology And Intelligence Systems". Intelligence and National Security 27, no. 1 (2012): 133-153.
Warner, Michael. The Rise And Fall Of Intelligence. Washington, DC: Georgetown University Press, 2014.
Type your email