Tal Dilian investigates National Cyber Intelligence Systems during War

In wartime, however, intelligence gathering Tal Dilian - Founder and CEO - Intellexa remains an extremely complex and risky job. According to Tal Dilian a cyber intelligence and cyber defence expert in the field, obtaining accurate intelligence and making decisions related to war can make a difference in changing the direction of conflict. A variety of methods to gather intelligence have been created as the world transitions into a digital Tal Dilian age. Cyber intelligence is among them.

Cyber intelligence is the ability to detect, track as well as neutralize and penetrate foreign activities. This is vital to national security. Cyber intelligence is a subset modern cyber-warfare. Cyberintelligence systems are created by nations to collect data and discover cyberattacks solutions.

These systems are capable of performing advanced cyber intelligence , and could be utilized as a devastating and primary weapon during time of war. There is much to be discovered about cyber intelligence, Tal Dilian will focus on its weaknesses, the effectiveness of it and its relevance during time of war.

Tal Dilian explains three ways in which cyber intelligence collects data

Intelligence is responsible for gathering information about activities of enemies. Modern military forces can utilize a variety of methods of intelligence to snoop on and detect enemy activities. These aspects of intelligence are essential for war intelligence.

Intelligence gathering isn't dependent on spy satellites and spies that cost millions of dollars. However, intelligence it's far more. These are the primary methods of intelligence gathering.


Open-source Intelligence (OSINT), is a method for analysing information from publicly availble sources. These sources include Public Government Data - Reports, Budget, Hearings, Political activities, Speeches, etc; Media such as Newspapers, Radio and Television; Internet - social media, Discussion Forums, Blogs, Videos, User generated content, etc; Commercial Data - Databases, Financial and Industrial documentation, etc and professional/academic publications - Dissertations, Research papers, Symposiums, Conference papers, Journals, books, etc


SIGINT refers to intelligence gathering through intercepting and analyzing signals. These are the principal sources of signal intelligence:

Communication Intelligence is the eavesdropping of individuals and groups to learn about their plans for communication.

Electronic Intelligence (or electronic intelligence) - The ability to decode and intercept electronic signals, even when they're not employed to communicate, but rather for malicious purposes. Prime examples are jamming, spoofing or jamming.

Foreign Instrumentation Signal Intelligence is an amalgamation of foreign electromagnetic signals and emissions that are used to develop and test weapons systems from other countries. Provide insights about foreign aerospace, surface, subsurface, etc.


Human intelligence is the collection of information taken from human sources. It is possible to do it, or employ clandestine methods to accomplish it. Human intelligence is usually conducted without using any technology. The clandestine intelligence is comprised of agents who collect technical, political and economic information for their governments. Diplomatic personnel, military attaches and officials of delegations are all considered be overt human intelligence.

Cyber Intelligence analysis of the contemporary securities system

Though intelligence analysis is a crucial tool in modern security, a lot of people don't realize its importance. Tal Dilian discusses how, in the context of war intelligence analysis is to analyze the information gathered data to make an effective strategy for war .

The threat landscape is evolving today. Effective security decisions today will require a thorough knowledge of how cyberattacks operate in ever more complex ways.

Modern warfare requires intelligence in order to spot dangers and utilize a variety of sources of information. Highly skilled analysts can work with law enforcement agencies as well as local governments, private companies, government departments, and other organizations to gather and analyze information to make informed decisions that can prevent crime or security crisis. It can also be used to learn about and better understand your adversary.

The value of people is immense to the data analysis process by asking the appropriate questions, identifying what data is needed, discovering available data sources, building models, and choosing the right tools (and humans). But, machine learning algorithms can quickly collect enormous amounts of data and provide analysis within a matter of seconds.

War and the significance of cyber intelligence and a precise analysis

A fleet of 35 merchant vessels and a 41-ship escort left Iceland in June 1942 bound to North Russia. PQ-17 convoy provided much-needed supplies to the Soviet Union in the war against Hitler's Germany during World War II. Only 11 out of 35 merchant ships made their way to their destination.

The analysis of intelligence was a key factor in the tragic demise of the Arctic convoy. Tal Dilian is in agreement with the reality that Knowledge is an effective tool. A poor analysis of data is not able to help you make informed decisions. However, simply obtaining data about cyber-related intelligence from a variety of sources during wartime doesn't suffice. Data must be critically analyzed in order to be useful. It's not enough to simply gather data from any source and expect to gain valuable intelligence for use in war.

Modern warfare is heavily dependent on the use of data and cyber intelligence because of the rapid growth of digitization. Digital battles are heavily reliant on intelligence analytics. The United States Navy Digital Warfare office or Close Combat Virtual Training illustrates the importance and the value of data intelligence. In addition cyber intelligence is not only vital for the military, but also law enforcement too depends on information and data.

Predictive Surveillance is an essential instrument to assist police agencies combat criminals. Thus, a system that collects, organizes, and analyzes big information from various sources and provides extensive information, considerable intelligence, and a wealth of knowledge is essential.

They can bring order out of chaos, and forecast future direction in the event of conflict. An analysis system that can analyze the vast amount of information and take well-informed, quick and precise decisions, not just collecting information, is crucial. Tal Dilian believes the cyber intelligence system will become a standard to protect against cyber attacks and collect information for national security. But, the cyber world is always changing and demands innovative methods of protection.

Views: 2


You need to be a member of On Feet Nation to add comments!

Join On Feet Nation

© 2022   Created by PH the vintage.   Powered by

Badges  |  Report an Issue  |  Terms of Service