Tal Dilian Examines National Cyber Intelligence Systems for War

Gathering intelligence is always difficult and risky, particularly during wartime. According to Tal Dilian the cyber expert in cyber intelligence and cyber defense expert collecting accurate Intellexa data and making war decision from it can change the tide of war. Many methods for gathering intelligence have been developed as the world moves towards a digital age. Cyber intelligence is one.

Cyber intelligence is critical for national security. It's about finding, tracking, neutralizing the enemy, neutralizing, penetrating and neutralizing foreign activities. Cyber intelligence is a subset of cyber warfare. Each nation has its own cyber-intelligence systems for cyberattacks and data gathering.

These systems perform sophisticated cyber intelligence and can be utilized as a lethal and effective weapon in times of war. There's a lot of cyber-intelligence that we could find but Tal Dilian will discuss its limitations, effectiveness, and importance in wartime.

Tal Dilian discusses three ways in which cyber intelligence collects data

Intelligence is responsible for gathering information about the enemy's activities. Modern militaries employ multiple methods of intelligence to track and track enemy activities. This is essential to gaining intelligence during war.

Intelligence gathering is more than the use of spy satellites, spies, or other expensive equipment. Here are some major modes of gathering intelligence:

Open-source Intelligence (OSINT), is a method of analysing information from publicly availble sources. These sources include Public Government Data - Reports, Budget, Hearings, Political activities, Speeches, etc; Media such as Newspapers, Radio and,20.htm Television; Internet - social media, Discussion Forums, Blogs, Videos, User generated content, etc; Commercial Data - Databases, Financial and Industrial documentation, etc and professional/academic publications - Dissertations, Research papers, Symposiums, Conference papers, Journals, books, etc


SIGINT refers to intelligence gathering via intercepting and analyzing signals. These are the primary sources of intelligence derived from signals:

  • Communication Intelligence: Listening in on groups and individuals, and gathering information about their plans to communicate.

  • Electronic Intelligence: Detecting electronic signals that are not being used to communicate and are instead used to operate an instrument or malicious software. Examples of this include spoofing and jamming.

  • Foreign Instrumentation and Signal Intelligence – This collection Tal Dilian covers foreign electromagnetic emission, signals, and signals used for the development and testing of weapon systems from other countries. Provide insights about foreign aerospace, surface, subsurface, etc.


Human intelligence is a collection and use of information from human resources. It may be public or conducted through clandestine methods. HUMINT is typically carried out by humans, and not using any technical methods. The term "clandestine" intelligence refers to the collection of political, economic and technical information by spies agents for their respective governments. Overt human intelligence includes diplomats, military attaches, and other officials in official delegations.

Cyber Intelligence analysis in the modern securities system

Modern security is dependent on the analysis of intelligence. Yet, many people do not realize the significance of it. Tal Dilian discusses how, when it comes to war, goal for intelligence analysis is to thoroughly look over the information collected to create an efficient war strategy.

The security landscape has evolved. Secure decisions that are well-informed can be made now by understanding how cyberattacks are more complicated to attack.

Modern warfare relies on intelligence, as it enables analysts to detect potential dangers by analyzing a wide range of data sources and strategies. Intelligence is an essential part of modern combat. Expert analysts are able work with police departments, local governments, government departments, private companies and other organisations to collect and analyze data to make informed choices that prevent security or criminal crises. Additionally, it can be used to learn from and become more knowledgeable about your enemy.

Humans however can add immense value to analysis of data by asking the relevant questions, understanding the information required, identifying data sources, constructing models and selecting the right tools (and individuals). Humans aren't able to combine large amounts of data and provide analysis in just a few seconds as machine algorithms that learn.

The importance of war and cyber intelligence as well as an accurate analysis of all data

On the 27th of June of 1942, out of Iceland 35 merchant ships set sail and an escort of 412-ships headed towards North Russia. PQ-17 convoy was a source of vital supplies for the Soviet Union in the war against Hitler's Germany during World War II. Only 11 of 35 merchant vessels made it to their destinations.

The analysis of intelligence played a significant factor in the reasons why the Arctic convoy met such a tragic end. Tal Dilian is in agreement with the assertion that Knowledge is a powerful tool. In the absence of data analysis the decisions made based on hearingsay or semi-educated assumptions are made. However, just collecting data on cyber intelligence from multiple sources in wartime will not suffice. The data must be properly understood and analysed in order to be of use. Data cannot be gathered from different sources without being critically analyzed and critically evaluated.

Modern warfare is heavily dependent on information and cyber-intelligence because of the rapid growth of digitization. Digital battles depend heavily on intelligent analytics. The United States Navy Digital Warfare office and Close Combat Virtual Training is the best example of the importance of data intelligence. Not only is cyber-intelligence crucial for the military as well as for law enforcement agencies.

Predictive surveillance has evolved into an essential tool to law enforcement authorities when combating criminality. The law enforcement agencies must have a system that gathers, organizes, analyzes, and interprets massive amounts of data from multiple sources.

They can bring order from chaos, present and forecast future direction in the event of conflict. It is essential to have a system to process the information and make informed, fast, and precise decisions. Tal Dilian believes that the cyber intelligence system will become a standard to protect from cyberattacks and to collect information for national security. But, the ever-changing cyber world requires the latest technologies.

Views: 1


You need to be a member of On Feet Nation to add comments!

Join On Feet Nation

© 2022   Created by PH the vintage.   Powered by

Badges  |  Report an Issue  |  Terms of Service