Human Intelligence (HUMINT), but has evolvedin the creation <strong>of</strong> all together new disciplines,dependent almost totally on technology, suchas Signals Intelligence (SIGINT), Geospatialintelligence (GEOINT), Measurement <strong>and</strong>Signature Intelligence (MASINT), Imageryintelligence (IMINT), Open Source intelligence(OSINT) <strong>and</strong> so on.Figure 1: Intelligence CycleSource: Author, adapted from Henry 1. Stimson CentreReport 70 s .1.1 Phase 1: Intelligence Collection<strong>and</strong> Technology1.1.2 Human Intelligence (HUMINT)Human Intelligence (HUMINT) is one <strong>of</strong> theoldest disciplines <strong>of</strong> intelligence institutions.HUMINT is usually defined as “a category <strong>of</strong>intelligence derived from information collected<strong>and</strong> provided by human sources” 9 . In contrastto the conventional dictum, this discipline isextensively dependent on technology in variousaspects. Covert communication <strong>and</strong> exchange <strong>of</strong>information from foreign agents, i.e. the “deaddrops” 10 , is one most critical component <strong>of</strong> acl<strong>and</strong>estine HUMINT operation. Technologyis extensively employed in terms <strong>of</strong> advancedencryption systems for the creation <strong>of</strong> securecommunication channels on IP as well as RFlink 11 .Some <strong>of</strong> the techniques commonly used arecipher based communication, involving milgrade symmetric encryption <strong>of</strong> 512bit key<strong>and</strong> above 12 ; Digital steganography 13 basedtechniques <strong>of</strong> embedding information in images<strong>and</strong> videos(Figure 2); IP based covert channels<strong>of</strong> communication involving embedding covertinformation as part <strong>of</strong> protocol streams orredundant bits, thus obfuscating contemporaryInternet interception mechanisms 14 ; Use <strong>of</strong> remoteVPS <strong>and</strong> VPN servers for obfuscation <strong>of</strong> agent’s IPdetails <strong>and</strong> communication path for track back,along with mail-eliminator for removing the traces<strong>of</strong> emails sent from the agents, especially to evadecounter intelligence cyber forensics; <strong>and</strong> hushmaillike services involving a single mail creationfor a single communication <strong>and</strong> subsequentlypurging <strong>of</strong> the account <strong>and</strong> auto creation <strong>of</strong>subsequent accounts for next communication 15 ;Spread spectrum <strong>and</strong> frequency hopping basedencrypted communication channels for tacticalcommunication devices required extensivelyin covert reconnaissance <strong>and</strong> direct actionoperations; Espionage based equipment suchas digital transmitters, GPS locators; Similarlyadvanced bugging devices for surveillance <strong>and</strong>so on.Similarly, one <strong>of</strong> the key components in HUMINTis the process <strong>of</strong> interrogation. Here again,technology has revolutionized the way in whichinterrogation is conducted with advances suchas the Psychoactive medication 16 , or the truthserums <strong>and</strong> advanced behavioral analysis basedlie detectors, involving vital bodily parametricmeasurement <strong>and</strong> correlation.Figure 2: Digital Steganography process 17 .Source: Onathan Cummins, Patrick Diskin, Samuel Lau<strong>and</strong> Robert Parlett, Steganography And DigitalWatermarking, School <strong>of</strong> Computer Science, TheUniversity <strong>of</strong> Birmingham, 2004.96The Indian <strong>Police</strong> Journal, October - December, 2012, Special Issue
These are just some <strong>of</strong> the aspects where technologyhas evolved the conventional processes in theHUMINT discipline <strong>of</strong> Intelligence.1.1.2 Signals Intelligence (SIGINT)Signals Intelligence (SIGINT) is usually definedas “A category <strong>of</strong> intelligence comprisingeither individually or in combination <strong>of</strong> allcommunications intelligence (COMINT),electronic intelligence (ELINT), <strong>and</strong> Foreigninstrumentation signals intelligence, howevertransmitted. Intelligence derived fromcommunications, electronic, <strong>and</strong> foreigninstrumentation signals.” 18 This discipline <strong>of</strong>Intelligence, if not fully, is extensively dependenton technology, as is evident from the meredefinition itself. One <strong>of</strong> the starting points inSIGINT is Signal detection, i.e. to know whetherthe signal/communication exists <strong>and</strong> subsequentlyto find the location <strong>of</strong> the transmitter <strong>and</strong> thereceiver. This process is extensively aided by set <strong>of</strong>receivers for particular frequencies <strong>of</strong> interest, incases where there is information about frequency<strong>of</strong> interest, else usually by, the analysis <strong>of</strong> powertransmitted on primary or sideb<strong>and</strong> frequenciesusing a spectrum analyzer.Figure 3: Spectrum Analyzer display for RF analysis. 19Source: Tektronix Data Sheets for RSA3300B Series.Similarly, another key component <strong>of</strong> SIGINTincludes direction finding. Here againtechnologies such tunable directional antennas<strong>and</strong> large omnidirectional arrays, such as theWullenweber, can be used for multipoint signalarrival time measurment <strong>and</strong> GPS correlationmethod for precise time synchronization. Apartfrom the above, COMINT or CommunicationIntelligence dealing with interception <strong>of</strong> voice,text etc. use techniques such as Automaticcomputation <strong>of</strong> session key (Kc) in real time forA5/1 <strong>and</strong> A5/2 algorithms, without disclosingtraces to subscribers; Invisible active intercept<strong>of</strong> A5/1, A5/2 <strong>and</strong> A5/0 GSM conversation;Full targeted recording through TMSI, IMSI<strong>and</strong> IMEI identification; multi-channel tunableCDMA Monitoring system operating at 450MHz,850MHz <strong>and</strong> 1900MHz CDMA b<strong>and</strong> forinterception <strong>of</strong> voice conversation, Text Message<strong>and</strong> service channel information automaticallyform the CDMA IS-95A, IS-95B <strong>and</strong> CDMA 2000-1x networks 20 ; <strong>and</strong> so on.In terms <strong>of</strong> Direction finding <strong>and</strong> location tracing<strong>of</strong> adversary, RF transmitters technologies basedon Single channel Direction finder involvingmulti-antenna array with a single channelradio receiver with amplitude, phase <strong>and</strong>hybrid comparison; Pseudo-doppler technique;Watson-Watt / Adcock antenna array; <strong>and</strong>Correlative interferometer etc. are extensivelyemployed. Other sub disciplines <strong>of</strong> SIGINTwhich are extensively dependent on technologyinclude FISINT (Foreign Instrumentation SignalsIntelligence) <strong>and</strong> TELINT (Telemetry Intelligence)based extensively on collection <strong>and</strong> analysis <strong>of</strong>sensor information from enemy weapon systems<strong>and</strong> Air borne platforms.1.1.3 Measurement <strong>and</strong> SignatureIntelligence (MASINT)“It measures <strong>and</strong> identifies battle space entitiesvia multiple means, that are difficult to spo<strong>of</strong> <strong>and</strong>it provides intelligence that confirms the moretraditional sources, but is also robust enoughto st<strong>and</strong> with spectrometry to differentiatebetween paint <strong>and</strong> foliage, or recognizing radardecoys, because the signal lacks unintentionalcharacteristics <strong>of</strong> the real radar system. “William K. Moore 21As defined by William Moore, MASINT is atechnologically intensive intelligence gatheringsub-discipline, which relies extensively onInformation gathering from various technologicalsensors/systems such as Airborne Electro-OpticalSensors;(Figure 4) Infrared; Optical Measurement<strong>of</strong> Nuclear Explosions; LASER based sensors;Spectroscopic sensors; Hyper spectral Imagery;Space-based Staring Infrared Sensors; Nuclearsensors involving Radiation surveys <strong>and</strong>dosimeter on airborne <strong>and</strong> space based platforms;Space-based Nuclear Energy Detection;Geophysical sensors for detecting undergroundfacilities/bunkers such as the Weather <strong>and</strong> SeaThe Indian <strong>Police</strong> Journal, October - December, 2012, Special Issue 97
- Page 1 and 2:
The Indian Police JournalOctober -
- Page 3 and 4:
From the Director’s DeskNew Delhi
- Page 5 and 6:
23rd December, 1887: TheJourney beg
- Page 7 and 8:
Courtesy - National Archives of Ind
- Page 9 and 10:
The Logo released on the completion
- Page 11 and 12:
Helmsmen of the IB during thePre-In
- Page 13 and 14:
SHRI V.G. VAIDYA, IPS(MAR 1992 TO J
- Page 15 and 16:
“Sleeman sahib ki jai”“No Cri
- Page 17 and 18:
their life and their problems relat
- Page 19 and 20:
Settling down of criminal tribes wa
- Page 21 and 22:
perish. Between 1841 and 1848, anot
- Page 23 and 24:
In conclusion, I would like to reco
- Page 25 and 26:
own race alone, had to be withdrawn
- Page 27 and 28:
a bee in his bonnet” 17 , and abo
- Page 29 and 30:
epresented by Tilak and his followe
- Page 31 and 32:
The agency more and more fine-tuned
- Page 33 and 34:
US was brewing, one William Hopkins
- Page 35 and 36:
came under the control of Indian mi
- Page 37 and 38:
neutralised many efforts by inimica
- Page 39 and 40:
e published by the Intelligence Bur
- Page 41 and 42:
As DD (Security), IB, I had occasio
- Page 43 and 44:
Chhomohlohri, all of them juxtapose
- Page 45 and 46:
Dormers Building, ShimlaThe Dormers
- Page 47 and 48:
eforms. Warren Commission, on the a
- Page 49 and 50:
and systems will increasingly come
- Page 51 and 52:
violence and destabilisation. This
- Page 53 and 54:
one develop. The all pervasive cult
- Page 55 and 56:
etween the states and the centre su
- Page 57 and 58:
Intelligence Agencies inIndian Demo
- Page 59 and 60: Democracies are, today, everywhere
- Page 61 and 62: depend substantially on the restrai
- Page 63 and 64: Of Pistols and Pigs andthe Old Tidd
- Page 65 and 66: it is lovingly caressed hundreds of
- Page 67 and 68: Through the Eyes of an IB OfficerSh
- Page 69 and 70: an Intelligence agency. He used to
- Page 71 and 72: My J&K ExperienceShri R.K. Kapoor,
- Page 73 and 74: there. We remained stranded there f
- Page 75 and 76: Scaling Himalayan Heights withthe I
- Page 77 and 78: proceed to Dungti to supervise the
- Page 79 and 80: tour of the White House and Lincoln
- Page 81 and 82: into unconsciousness two hours earl
- Page 83 and 84: which was completed successfully wi
- Page 85 and 86: leaders. This happened around the t
- Page 87 and 88: My Unforgettable Yearsin the North-
- Page 89 and 90: stated that Prakash Singh, Assistan
- Page 91 and 92: take her into confidence. That woul
- Page 93 and 94: Police - Intelligence InterfaceShri
- Page 95 and 96: Shreekant Bapat and I surveyed the
- Page 97 and 98: excellence, dedication and commitme
- Page 99 and 100: Immigration, Inter-State Disputes,
- Page 101 and 102: Observations on India’s State and
- Page 103 and 104: assessments that arose after the ca
- Page 105 and 106: levels. The deficiencies of one par
- Page 107 and 108: of laying a network of useful roads
- Page 109: Technology in Intelligence-Future S
- Page 113 and 114: Figure 6: Open Source Information o
- Page 115 and 116: events) and inference from evidence
- Page 117 and 118: 9North Atlantic Treaty Organization
- Page 119 and 120: Shri Dave was posted back to the lB
- Page 121 and 122: He even suggested separate pay scal
- Page 123 and 124: The Unsung HeroesThe Intelligence B