12.07.2015 Views

Editorial Board Contents - Bureau of Police Research and ...

Editorial Board Contents - Bureau of Police Research and ...

Editorial Board Contents - Bureau of Police Research and ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Human Intelligence (HUMINT), but has evolvedin the creation <strong>of</strong> all together new disciplines,dependent almost totally on technology, suchas Signals Intelligence (SIGINT), Geospatialintelligence (GEOINT), Measurement <strong>and</strong>Signature Intelligence (MASINT), Imageryintelligence (IMINT), Open Source intelligence(OSINT) <strong>and</strong> so on.Figure 1: Intelligence CycleSource: Author, adapted from Henry 1. Stimson CentreReport 70 s .1.1 Phase 1: Intelligence Collection<strong>and</strong> Technology1.1.2 Human Intelligence (HUMINT)Human Intelligence (HUMINT) is one <strong>of</strong> theoldest disciplines <strong>of</strong> intelligence institutions.HUMINT is usually defined as “a category <strong>of</strong>intelligence derived from information collected<strong>and</strong> provided by human sources” 9 . In contrastto the conventional dictum, this discipline isextensively dependent on technology in variousaspects. Covert communication <strong>and</strong> exchange <strong>of</strong>information from foreign agents, i.e. the “deaddrops” 10 , is one most critical component <strong>of</strong> acl<strong>and</strong>estine HUMINT operation. Technologyis extensively employed in terms <strong>of</strong> advancedencryption systems for the creation <strong>of</strong> securecommunication channels on IP as well as RFlink 11 .Some <strong>of</strong> the techniques commonly used arecipher based communication, involving milgrade symmetric encryption <strong>of</strong> 512bit key<strong>and</strong> above 12 ; Digital steganography 13 basedtechniques <strong>of</strong> embedding information in images<strong>and</strong> videos(Figure 2); IP based covert channels<strong>of</strong> communication involving embedding covertinformation as part <strong>of</strong> protocol streams orredundant bits, thus obfuscating contemporaryInternet interception mechanisms 14 ; Use <strong>of</strong> remoteVPS <strong>and</strong> VPN servers for obfuscation <strong>of</strong> agent’s IPdetails <strong>and</strong> communication path for track back,along with mail-eliminator for removing the traces<strong>of</strong> emails sent from the agents, especially to evadecounter intelligence cyber forensics; <strong>and</strong> hushmaillike services involving a single mail creationfor a single communication <strong>and</strong> subsequentlypurging <strong>of</strong> the account <strong>and</strong> auto creation <strong>of</strong>subsequent accounts for next communication 15 ;Spread spectrum <strong>and</strong> frequency hopping basedencrypted communication channels for tacticalcommunication devices required extensivelyin covert reconnaissance <strong>and</strong> direct actionoperations; Espionage based equipment suchas digital transmitters, GPS locators; Similarlyadvanced bugging devices for surveillance <strong>and</strong>so on.Similarly, one <strong>of</strong> the key components in HUMINTis the process <strong>of</strong> interrogation. Here again,technology has revolutionized the way in whichinterrogation is conducted with advances suchas the Psychoactive medication 16 , or the truthserums <strong>and</strong> advanced behavioral analysis basedlie detectors, involving vital bodily parametricmeasurement <strong>and</strong> correlation.Figure 2: Digital Steganography process 17 .Source: Onathan Cummins, Patrick Diskin, Samuel Lau<strong>and</strong> Robert Parlett, Steganography And DigitalWatermarking, School <strong>of</strong> Computer Science, TheUniversity <strong>of</strong> Birmingham, 2004.96The Indian <strong>Police</strong> Journal, October - December, 2012, Special Issue

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!