Monday, May 7, 2007

National Security and Open-source Imagery

INTRODUCTION
In the 21st Century one of the most fascinating new mediums being explored on a large-scale level is that of overhead imagery. Satellite imagery was once tucked away securely in the realms of the military and of the scientific community. With new applications such as Google’s Google Earth and Microsoft’s Windows Local Live, overhead imagery is becoming ever more prevalent in the civilian sector. In today’s terrorism-conscious world the obvious concern is one of national security, a concern which has proven to be unfounded.

OPEN SOURCE IMAGERY
Open source imagery has become a common tool for many individuals. Overhead imagery has a myriad of uses in the private sector, ranging from business applications such as real estate to administrative applications such as land zoning. Overhead satellite imagery has been made available free to the general public at numerous locations on the internet, from Global Security’s Image of the Week[1] to the National Geospatial-Intelligence Agency’s Raster Roam site.[2] Perhaps the most significant development in the realm of open source imagery has been Google’s release of Google Earth, a free software application allowing users to browse a worldwide database of overhead imagery.

Google Earth is the benchmark in today’s overhead imagery scene. The ease of use of the application allows users to view any point on the globe with ease. Points of interest can be placemarked, and placemark files can be shared with other users on the internet by inserting them into Google Earth’s placemark database. Google Earth has recently begun to see use in the mainstream media. FoxNews commonly uses Google Earth to depict the locations of news stories. Various corporations are beginning to see the value of the application as well. Frank Taylor’s Google Earth Blog constantly chronicles new industry uses of Google Earth, as well as significant updates to the imagery server or the software itself.[3]

The most common method of exploitation is to devise a series of placemarks for a given area and share them with potential clients or interested parties via a website. This particular usage is beginning to see widespread use in the field of real estate, allowing potential buyers to get a birds-eye view of the property in question and view the surrounding area. With Google Earth’s incorporation of placemark databases containing schools, restaurants, and other necessities, a fair assessment of a potential community can be made without ever leaving the home.

While Google Earth is a valuable and powerful imagery exploitation tool, it is limited in select areas. Most significantly, the high-resolution imagery database is incomplete and as such constantly updated. While the entire globe is visible in at least 15 meter resolution, this is insufficient for detailed examination of most locations. The highest resolution available is 15 centimeters in select locations such as Las Vegas, with most other high-resolution areas falling around the 1 meter range.[4] The problem is that there are many areas of potential interest that do not yet contain high-resolution imagery. Other high-resolution areas are sometimes updated with more current imagery, potentially causing various placemarks to become invalid.

In order to obtain open-source imagery of the desired resolution, a user may choose to obtain such imagery from a paid source such as Digital Globe. This method ensures that the user will end up with the desired imagery at the desired resolution. The only limitations are the price, and the time it can take to collect the imagery if it does not already exist in a database.

THE BASRA QUESTION
On the 13th of January, 2007, The Telegraph reported that insurgents operating in Basra in southern Iraq appeared to have been using Google Earth to pinpoint British troop locations to conduct terrorist attacks.[5] This incident appeared to represent a potential problem with public access to overhead imagery. The reality is far from serious.

In order for the extremists to have made use of Google Earth imagery effectively, it must have been current. The imagery of downtown Basra currently available in Google Earth was taken in 2002. Imagery dates can be verified by viewing the Digital Globe coverage areas within Google Earth and clicking on the placemarks denoting the collection date. At first glance, there would appear to have been imagery of Basra taken as late as 2006. However, closer examination shows that this imagery was not incorporated into the Google database, as the snapshot view depicts extreme cloud cover over the area. Google Earth does source a good deal of imagery from Digital Globe, but every image taken is not necessarily incorporated into the database. Ergo, any current imagery in Google Earth would not have assisted extremists in Basra in locating British forces. The following image taken from Google Earth depicts the current view of the Basra Palace. No British troops would appear to be in residence.

The Telegraph asserts that extremists had printouts of Google Earth imagery depicting British forces in Basrah Palace.[6]
While the imagery in the database does not depict any occupation at the palace, there are two other points to be considered. First, external imagery from sources such as Digital Globe, Global Security, or Terra Server can be incorporated as an overlay into Google Earth. Just because the imagery was taken from Google Earth, it therefore did not necessarily source from Google Earth. Secondly, The Telegraph has alleged that Google Earth has “blotted out” certain areas where sensitive British military operations are conducted. These areas include Hereford, home to the British Special Air Services commandos, and Faslane, home to the UK’s Trident submarine strategic nuclear deterrent force.[7]

Unfortunately, The Telegraph’s explanation does not wash. Simply put, Hereford and Faslane were never in anything other than 10-15 meter resolution to begin with. After reading many of Patrick Robinson’s novels, the author became enamored with Faslane and was on the lookout for a high-resolution update to contain the submarine base. That update has, to date, still not happened. It is possible that Google “rolled back” their coverage in Basra to an earlier date to remove evidence of British occupation of the city. The surrounding area includes Basra International Airport. There are various placemarks visible for British combat aircraft which are no longer visible, suggesting that an imagery change did in fact take place. The following image taken from Google Earth depicts a parking ramp at Basra International Airport. The placemark for an RAF C-130 Hercules aircraft can be seen, clearly showing that the imagery has been changed at some point.


NATIONAL SECURITY CONCERNS OF OPEN SOURCE IMAGERY
The Basra incident highlights one of the chief concerns of public access to high-resolution overhead imagery: such imagery may enable terrorist or military forces to gain an advantage over an enemy. There are a myriad of military installations and targets which are visible in overhead imagery, particularly in Google Earth. The question therefore becomes whether the ability to access such imagery is a serious threat to the national security of a nation being imaged.

There are two different aggressors which should be considered: terrorists and nation-states. Terrorists and other insurgent groups would seem to have the most to benefit from having access to overhead imagery. Nation-states would not, for the most part, need to rely on open-source imagery for intelligence, as they would enjoy access to a multitude of other intelligence sources.

In order for a terrorist to make use of overhead imagery, the imagery must be current, it must depict the target in sufficient resolution to be of value to a potential operation, and it must be available. Overhead imagery from a plethora of sources fits these requirements, particularly availability; there is nothing stopping a terrorist from accessing Google Earth or ordering imagery from Digital Globe. However, the question is whether or not that imagery provides the extremist group with a particular advantage or ability that they would not have otherwise enjoyed. The answer is a resounding no.

Extremists employ various methods of attack, including car bombings, improvised explosive devices, and hit-and-run tactics. None of these tactics would gain any significant advantage if overhead imagery was available. However, mortar and rocket attacks would seem to benefit. Possessing overhead imagery would allow for more accurate targeting as target locations could be more accurately measured. The problem with this argument is that rocket and mortar systems are unguided and inherently inaccurate to begin with. Were guided weapons employed, the added accuracy could in theory be of a tactical benefit. With an unguided weapon, however, the added knowledge gained from analyzing overhead imagery is not as useful.

The idea of terrorists being able to gain more detailed knowledge of target areas is also in question. Many Coalition bases in Iraq, for example, possess native Iraqi workforces. Intelligence on troop and facility locations can be gleaned from these individuals by extremist groups. Also, any street map will provide a good deal of information regarding the potential locations of facilities. With careful observation and a good street map, an insurgent in Basra could accurately map out troop and facility locations. Ergo, overhead imagery is not necessarily needed. While it would seemingly negate the need for a period of observation, it does not provide an insurgent group with anything they cannot obtain for themselves.

A nation-state presents a whole new argument. While the insurgent group may concern itself with simple targets such as troop concentrations or bases, the nation-state may desire to be far more detailed in its targeting. Examples of potential targets include surface to air missile (SAM) sites, nuclear weapon facilities, and naval bases.

The key to gaining intelligence of any value from open source overhead imagery lies in the detail of the imagery itself. Consider the following scenario: a Turkish combat aircraft is tasked with striking a naval vessel leaving Sevastopol which is going to deliver military equipment to Greek Cypriot forces on Cyprus. The primary static threat to a strike aircraft comes from early warning systems and SAM sites. Once again, imagery in Google Earth can be considered a likely source of open source imagery for the area as Sevastopol is imaged in high-resolution. The problem becomes one of system identification. Defending Sevastopol, there are three active SAM sites that can be identified. Due to the nature of the imagery, they can be identified as Russian-made Almaz S-300P family systems. This is where the problem lies. Further east near Alushta, there is an S-300PT which can be identified. The S-300PT is an early-model S-300P system with a range of 47 kilometers.[8] The problem lies with the other three sites: they cannot be positively identified as anything other than generic S-300Ps due to the similarities between the remaining variants. The S-300P family contains missiles ranging from 47 to 200 kilometers; while the systems can be broadly classified as S-300PM or S-300PM-1 variants due to the length of the TELs, this does not provide insight into what missiles are being employed.[9] Knowing which system an aircraft will face is an integral part of the mission planning process; it will dictate the route to be taken, the sortie profile, and in most cases the weapon to be employed. If shorter-range systems were present, then perhaps a standoff weapon would be used in the attack. This scenario highlights the value of a military-grade imagery intelligence capability, as well as the value of other intelligence sources such as Electronic Intelligence (ELINT) in conducting a study of a potential target area. Commercial overhead imagery is therefore not particularly valuable to a nation state as a source of intelligence.

There is another reason why open source imagery is not typically valuable to a nation-state. Overhead imagery typically contains a snapshot of a particular moment in time. There are numerous SAM sites, for example, visible worldwide using Google Earth. Many of these sites were unoccupied at the time they were imaged. However, many modern SAM systems such as the S-300P are mobile systems and can easily be relocated. Relying on a commercial image obtained at some point in the past does not therefore necessarily provide a current view of an enemy’s defensive network. Most military intelligence gathering organizations will have the capability to gather near real-time imagery of a potential target area, providing a much more current picture of an enemy’s forces in the area. A further example would be that of naval facilities. While a snapshot of Litsa Guba may show four Typhoon-class SSBNs in residence, there is no guarantee that the submarines are actually in-residence given the timing of the image acquisition.

There is one more potential national security concern with open source imagery. While open source imagery has been shown to not present an aggressor with an advantage other than convenience, this concern is far more serious. Many areas inside the United States and the rest of the world are becoming visible to the general public for the first time. There is the chance that sensitive or classified activities may be uncovered. At first glance, this would seem to be mildly ludicrous. Take the example of Area 51 in the United States. Area 51 has long since been mooted as the home of classified aerospace-related test activity. Area 51 is also visible in Google Earth in high resolution. While there are F-16s and 737s visible on the tarmac, no “black jets” are anywhere to be seen. The reason, provided the aircraft were present to begin with, is that satellite orbits can be tracked. During the Cold War it was common practice for test aircraft to be concealed from view when Soviet satellites were known to be overhead. This practice does not mean, however, that evidence of sensitive or classified activity cannot be discerned using open-source imagery.


The preceding image captured in Google Earth depicts a fenced in facility outside of El Paso, Texas, set half a mile off of Route 180. At first glance, this appears to be a benign military facility. Closer examination, however, reveals something far more sensitive. Visible inside the facility are a plethora of foreign weapon systems, including Russian-made SA-6 and SA-11 SAM systems. America’s possession of foreign weapon systems is nothing new or sensitive. The acquisition of Moldovan MiG-29s in the 1990s was well publicized, for example. This facility would appear to be something of an enigma, however, as there is no reference in any open source publication to American acquisition of an SA-11 SAM system. The logical assumption is that this facility is related to the exploitation of foreign weapon systems. Given that the US Army’s Air Defense School is located in nearby El Paso at Fort Bliss, this would seem to be a sensible location for SAM system exploitation given the large range areas that Fort Bliss contains. This activity in itself is not necessarily sensitive, but the mention of an SA-11 in the United States could be enough to cause a foreign power to investigate how exactly it was obtained, potentially leading to a future problem should it turn out to have been covertly acquired. That being said, once again image resolution comes into play here. Without closer examination, either on-site or through very high resolution imagery, the systems in the El Paso facility cannot be positively identified as actual hardware; they could merely be decoys used for training purposes or as range targets. This does not alleviate the concern that national security could be threatened by a knowledgeable interpreter armed with the right set of imagery to work from.

The news media can also be a source of concern. In 2001, the United States was gearing up to begin Operation ENDURING FREEDOM. The author was stationed at Al Udeid air base in Qatar in March of 2002 to support this effort. The location was classified until a March 2003 visit by the Vice President led to the announcement of the location by the news media. Prior to this, however, the news media reported in January 2002 that Global Security had obtained satellite imagery of the airbase from Digital Globe.[10] This was a clear breach of security, and could have led to disastrous results. A Middle Eastern insurgent group, or even a nation state like Iraq, could have chosen to strike the airbase, whereas they may not have been aware of the facility had the news media not plastered satellite imagery of Al Udeid all over their networks.

GOVERNMENT RESPONSE OPTIONS
Open source imagery does not appear to present a serious risk to any nation’s security. However, if open source imagery is regarded as a threat to national security, the government being imaged does have a number of options to alleviate its concerns.

First, the government can take steps to ensure that sensitive activities are concealed from satellite view by studying satellite over flight patterns. As mentioned before, this was a technique employed by the United States during the Cold War.

Secondly, the government can request that imagery providers such as Digital Globe or Google Earth do not release imagery or reduce the image quality of sensitive areas such as military installations or nuclear facilities. In Google Earth, for example, the NATO AWACS base at Geilenkirchen, Germany is pixellated, precluding any viewing of the airbase or its contents. This sort of request may have led to the rolling back of imagery near Basra in Google Earth, as was previously discussed.

Thirdly, nation states could enact laws restricting the publication of imagery depicting military facilities or military operations without prior approval. While this would likely meet with public disapproval, if the nation state does perceive such imagery to be a national security concern, then this would appear to be a logical course of action.

CONCLUSION
Open source overhead imagery is a fascinating tool for professionals and enthusiasts alike. While there are certain national security concerns over the public availability of overhead imagery, the concern is for the most part unfounded. Restricting access to overhead imagery will not deter either terrorist groups or nation states from using violence to achieve their goals, nor will it prevent them from using other means to gather vital intelligence information. Given the characteristics of the imagery and the overall global situations into which it is injected by the media, the only possible conclusion is that the public availability of open source overhead imagery is not a serious national security concern, nor does it provide terrorist groups with a significant advantage in terms of planning and carrying out attacks. In all actuality, the presence of publicly available imagery might be a deterrent in some cases. Either way, overhead imagery is here to stay, and as a whole the world is better off for it thanks to the numerous civilian, scientific, and commercial uses it provides.

[1] Available online at http://www.globalsecurity.org/eye/index.html; recent updates appear to be on a less than weekly basis, unfortunately.
[2] Available online at http://geoengine.nga.mil/geospatial/SW_TOOLS/NIMAMUSE/webinter/rast_roam.html
[3] Available online at http://www.gearthblog.com/
[4] Online source available at: http://earth.google.com/coverage/coverage_list.pdf
[5] Online source available at: http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/01/13/wgoogle13.xml
[6] Online source available at: http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/01/13/wgoogle13.xml
[7] Online source available at: http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/01/20/wgoogle20.xml
[8] James C. O’Halloran, ed., Jane’s Land Based Air Defense, 15th edition (Surrey: Jane’s Information Group Limited, 2002), 148-150.
[9] Ibid.
[10] http://www.globalsecurity.org/military/facility/udeid.htm

1 comment:

Anonymous said...

quite interesting post. I would love to follow you on twitter. By the way, did you hear that some chinese hacker had hacked twitter yesterday again.