Tal Dilian explores National Cyber Intelligence Systems during War

It is never easy and risky, particularly in times of war. According to Tal Dilian the cyber security specialist and cyber expert , gathering accurate information and making a war-related decision from it can change the tide of war. As the world is moving into the modern age in which we are more connected than ever, a variety of methods of intelligence gathering are being developed. Cyber intelligence is among them.

Cyber intelligence is the tracking, identification, neutralizing and penetrating of foreign operations that are vital for national security. Cyber intelligence is one of the subsets of modern cyber warfare. For information gathering and cyberattacks the cyber intelligence system is a national security system which was developed by different countries.

They provide sophisticated cyber intelligence and can be used during war as a main weapon, as well as as a deadly weapon. Tal Dilian will address the limits of cyber intelligence and its efficacy in wartime.

Tal Lilian discusses three ways that cyber intelligence gathers info

Intelligence is responsible to gather details about the activities of the enemy. Modern military organizations employ various methods of intelligence to monitor and track the activities of enemies. This is critical to gaining intelligence during war.

Intelligence gathering is more than using surveillance satellites, spy spies or other expensive devices. Here are some major modes of intelligence gathering:


Open-source Intelligence (OSINT) is a technique for analyzing data from public sources. These sources include Public Government Data - Reports, Budget, Hearings, Political activities, Speeches, etc; Media such as Newspapers, Radio and Television; Internet - social media, Discussion Forums, Blogs, Videos, User generated content, etc; Commercial Data - Databases, Financial and Industrial documentation, etc and professional/academic publications - Dissertations, Research papers, Symposiums, Conference papers, Journals, books, etc


SIGINT stands as intelligence gathering through interception and analysis of signals. Here are some of the sources that signal intelligence comes from:

Communication Intelligence (eavesdropping people and groups to find out about their plans to communicate)

Electronic Intelligence: Intercepting electronic signals that are not being used for communication and are instead used to operate a device or malicious program. Two examples of this include the use of jamming and Spoofing.

Foreign Instrumentation Sign Intelligence (FISI) A collection of electromagnetic signals from foreign countries and signals that is used to test weapon systems from other countries designs and builds. Provide insights about foreign aerospace, surface, subsurface, etc.


Human intelligence is the collection of information from human resources. It could be classified as private or public. The majority of people perform HUMINT without the aid of technology. Clandestine human intelligence includes spy agents that are accountable for gathering economic, political and technical data for their government. Diplomatic personnel, military attaches and members of official delegations are all considered to as being overt human intelligence.

Analyzing Cyber Intelligence in the Modern Securities System

Intelligence analysis is a vital technique for modern security, yet many people are not aware of the importance. Tal Dilian explains how when it comes to war the goal of for intelligence analysis is to carefully analyze the information collected to create an efficient strategy for war.

Today's threat landscape changes. Making smart security decisions today is crucial if you wish to comprehend how cyberattacks work.

Intelligence plays an essential part in modern warfare since it allows analysts to spot dangers by using different sources of information and methods. Experiential analysts work in partnership with law enforcement agencies, local authorities, as well as government departments. They analyze data to aid in making sound decisions and avoid security or criminal crises. It can also be utilized to learn from and improve your knowledge of your enemy.

Humans, on the other hand, add immense value to the data analysis process by asking the right questions, recognizing what data is needed, identifying available data sources, developing models, and deciding on the most effective tools (and humans). However, algorithms that learn from machines are able to quickly compile massive amounts of data and offer analytics within a matter of seconds.

Cyber Intelligence, War and an accurate analysis of all information

Threety-five merchant Tal Dilian - Founder and CEO - Intellexa vessels as well as 41 crew members escorted them from Iceland on the 27th of June 1942 to go to North Russia. The PQ-17 convoy is one of Allied forces’ Arctic convoys that was a key source of supply for the Soviet Union during World War II. Only 11 of the 35 commercial vessels made it to their destinations.

The tragic end of the Arctic convoy was the result of intelligence analysis. Tal Dilian is of the reality that Knowledge is an extremely powerful tool. A thorough analysis of data is crucial to ensure that decisions are not Tal Dilian solely based on hearsay, semi-educated guesses and the personal or cognitive bias. However, it is not enough to collect information on cyber-security from multiple Tal Dilian, Intellexa sources in wartime. Data needs to be thoroughly analysed in order to be valuable. It isn't enough to simply collect information from different sources and expect valuable war intelligence from it.

Modern warfare relies heavily upon the use of data and cyber intelligence due to the rapid increase of digitization. Digital battles depend heavily on intelligent analytics. The United States Navy Digital Warfare office, and Close Combat Virtual Training are two instances of how crucial information technology is. Not only is cyber intelligence vital for the military, but also important for law enforcement.

Predictive surveillance is an important tool that law enforcement agencies use to combat crime. The system needs to be able to collect, organize, and analyze big data from multiple sources. It also provides significant intelligence and extensive knowledge.

They can bring order out of chaos, and anticipate future direction during situations of war. It is vital to establish a system that can analyse all the information collected and make accurate fast, well-informed choices. Tal Dilian believes cyber intelligence systems are now the norm to counter cyberattacks as well as collect information for the national good. However, the world of cyber is always changing and demands new strategies.

Views: 2


You need to be a member of On Feet Nation to add comments!

Join On Feet Nation

© 2022   Created by PH the vintage.   Powered by

Badges  |  Report an Issue  |  Terms of Service