Lexicon

TECHINT

Technical Intelligence — exploitation of foreign weapons systems, captured equipment, and adversary hardware

Audio readout of this entry.

TECHINT — technical intelligence — is intelligence derived from the physical examination, reverse-engineering, and exploitation of foreign weapons systems, equipment, munitions, and engineered hardware. The discipline is distinguished from MASINT, which captures the signatures an object emits at a distance, and from SIGINT, which captures its emissions; TECHINT is what an analyst learns when the object itself is recovered and disassembled on a workbench.

The discipline has been operationally important since the Second World War, when British and American teams reverse-engineered German V-1 cruise missiles, V-2 ballistic missiles, and Me 262 jet aircraft. Operation Paperclip — the recruitment of German scientists into US programmes between 1945 and 1959 — is documented in this corpus as a parallel HUMINT operation, but the underlying technical assessments of the German programmes were classical TECHINT. The post-war Soviet equivalent (the Tupolev Tu-4, a serial-produced reverse-engineered B-29) was the most extensive documented case of state-level TECHINT exploitation in the period.

Cold War TECHINT centred on the analysis of Soviet equipment that came into Western possession through three principal routes: defection (Viktor Belenko's 1976 flight of a MiG-25 to Hakodate, Japan, gave US Air Force teams six weeks to disassemble the airframe before its return); export to non-Warsaw-Pact states (Israeli, Egyptian, and Chinese-held Soviet equipment was systematically examined by US and UK teams); and battlefield recovery (Soviet equipment captured by US-aligned forces in Korea, Vietnam, the Yom Kippur War, and the Gulf wars). The institutional homes for the work are the National Ground Intelligence Center (NGIC) at Charlottesville, Virginia; the Naval Surface Warfare Center; and the Air Force Foreign Materiel Exploitation programme, with parallel infrastructures in the United Kingdom, France, and Germany.

Modern TECHINT has expanded into IED forensics — the systematic disassembly and triangulation of improvised explosive devices used in Iraq and Afghanistan, which produced both attribution to specific bomb-makers and intelligence on supply chains — and into cyber-physical exploitation, where captured network appliances, drones, and connected weapon systems are analysed both as hardware and as software platforms. The Stuxnet investigation drew on the latter form when investigators reverse-engineered the worm; the parallel hardware-side work on the centrifuges themselves (cf. Symantec and Langner technical analyses) is TECHINT in the classical sense.

See also

  • MASINT — captures signatures of objects at a distance; TECHINT examines the objects themselves
  • HUMINT — the recruiting and defection operations that often produce the equipment TECHINT exploits
  • SIGINT — captures what equipment transmits; TECHINT captures what it is