Tal Dilian Examines National Cyber Intelligence Systems at War

Even in wartime the gathering of intelligence remains an extremely complex and risky job. According to the cyber defense and Intellexa cyber intelligence expert Tal Dilian, collecting accurate information and making the right decisions in war can change the tide of war. There are a variety of methods for collecting intelligence in the current digital age. The Cyber Intelligence System is just one of these methods.

Cyber intelligence is crucial to the national interest. It involves the detection, tracking and neutralization of foreign operations. Cyber intelligence is a component of cyber warfare in the present. In order to gather information and prevent cyberattacks the cyber intelligence system is a national system that has been created by various nations.

These systems employ advanced cyber-intelligence to deliver lethal and powerful weapons during the wartime. Tal Dilian will talk about the limits of cyber intelligence, the effectiveness of it and the importance of wartime.

Tal Dilian discusses three ways in which cyber intelligence collects data

Intelligence collects information on enemy activities. Modern militaries employ multiple methods of intelligence for surveillance as well as surveillance. These are the most important aspects of intelligence in the war.

Intelligence gathering is more than using spy satellites, spies or other expensive equipment. A few of the most significant methods for gathering intelligence are mentioned below:

Open-source intelligence (OSINT) collects, and analyses data gathered from publicly available sources. These sources include Public Government Data - Reports, Budget, Hearings, Political activities, Speeches, etc; Media such as Newspapers, Radio and Television; Internet - social media, Discussion Forums, Blogs, Videos, User generated content, etc; Commercial Data - Databases, Financial and Industrial documentation, etc and professional/academic publications - Dissertations, Research Tal Dilian, Intellexa papers, Symposiums, Conference papers, Journals, books, etc


SIGINT is a word used to describe intelligence gathering via the intercept of signals. Here are some of the sources signal intelligence originates from:

  • Communication Intelligence involves the listening of individuals and groups to learn about their communication plans.

  • Electronic Intelligence - Intercepting digital signals that are not intended for communication , but instead for operating the device or devising a malicious plan. Spoofing and jamming are two instances.

  • Foreign Instrumentation and Signal Intelligence This collection covers foreign electromagnetic emissions, signals and signals that are used in the creation and testing of weapon systems from other countries. Provide insights about foreign aerospace, surface, subsurface, etc.


Human intelligence can be described as the collection of data from humans. It may be public or carried out through secret operations. HUMINT is usually carried out by people instead of using any technical means. Clandestine human intelligence is the term used to describe agents who collect technological, economic and political data for their respective governments. Human intelligence that is overt includes diplomats, military attaches, as well as other officials in official delegations.

Analyzing Cyber Intelligence in Modern's Securities Systems

Although intelligence analysis is crucial in modern security, many people do not understand the Tal Dilian - Founder and CEO - Intellexa importance of it. Tal Dilian explains why when it comes to warfare, the purpose of intelligence analytics is to study the information collected to create an effective strategy for war.

The threat landscape of today is constantly changing. Understanding how cyber attacks work in ever more complex ways is critical in making intelligent security choices today.

Modern warfare includes intelligence as a key component. This is because intelligence allows analysts as well as scientists to identify dangers from a range of sources. Experienced analysts work with law enforcement agencies, local governments as well as government departments. They study data to help make sound judgments and help prevent criminal or security crisis. You can also utilize it to gain more information about your adversaries.

Humans add immense value to the process of data analysis by asking the right questions, and recognizing the type of data that is needed, discovering available sources of data, constructing models, and choosing the right tools (and humans). However, machines learning algorithms are capable of quickly assembling massive amounts of data and offer analytics in just seconds.

The importance of cyber intelligence and the exact analysis of all data

On the 27th of June on the 27th of June, 1942, 35 merchant ships and a 41 ship escort took off from Iceland to North Russia. The convoy PQ-17, one of the Allied forces' Arctic convoys was a crucial supply point for the Soviet Union during World War II. Only 11 out of 35 merchant ships made it on their journey to their destinations.

The analysis of intelligence played a significant role in the tragic fate of the Arctic convoy. Tal Dilian is in agreement with the reality that Knowledge is an extremely powerful tool. Decisions based on hearsay, educated guesses or personal/cognitive biases are made in the absence of good data analysis. But, simply obtaining information on cyber-security from various sources in wartime isn't enough. Data must be critically analyzed in order to be useful. Data cannot be gathered from different sources without being critically analyzed and critically understood.

Modern warfare relies heavily upon the use of data and cyber intelligence due to the rapid increase of digitization. Digital battles are heavily reliant on the use of intelligent analytics. The United States Navy Digital Warfare office and Close Combat Virtual Training highlight the importance of data intelligence. Apart from being essential for law enforcement, the military is also dependent on cyber-related intelligence.

Predictive Surveillance is a vital tool that can help law enforcement agencies tackle criminals. The system has to be able to collect, organize, and analyze massive amounts of data from many sources. It will also provide significant intelligence and extensive knowledge.

These systems are able to discern the chaos, create order and project future direction in times of conflict. It is crucial that the system be able to analyse all information and make fast, accurate, well-informed decisions. Tal Dilian is convinced that the cyber intelligence system will soon become a standard to protect against cyber attacks and collect intelligence for national interests. However, the world of cyber is constantly evolving and calls for new methods of protection.

Views: 11


You need to be a member of On Feet Nation to add comments!

Join On Feet Nation

© 2022   Created by PH the vintage.   Powered by

Badges  |  Report an Issue  |  Terms of Service