achieve this, multi-redundant networks shouldbe designed with strong Encryption systemspreferably mil grade 512 bit key symmetricencryption, accompanied with strong multi-factorauthentication, preferably biometric system.This should be accompanied with Intrusiondetection/prevention systems, Proxy integratedGateway firewalls, Network behavior analyzers,UTM, Application s<strong>and</strong>boxes, Integritymanagement systems with event logging, secureoperating system specifically hardened for highgrade security, disk encryption systems, hardwareconfiguration management/alert systems, dateware houses with disaster management systemsalong with multi redundant active-activemode high availability clusters etc. 32 All thesemechanisms will ensure a multi level securitysystem with integrated survivability mechanismssupporting a secure intelligence disseminationsystem. Although, survivability <strong>and</strong> security arethe key requirements in this phase, the aestheticsare again a critical component especially inthe visual representation <strong>of</strong> information to thedecision makers. These visual systems should haveback correlation <strong>and</strong> linkages to all the phases <strong>of</strong>intelligence cycle, which may be required duringthe final briefing to the decision maker. Also, thesystem for dissemination should have a feedbackloop, which may induce the strategic directives<strong>and</strong> necessary comments to intelligence cycle forfurther refining the information. All <strong>of</strong> the aboveare extensively technology driven processes,thus reiterating the fact that technology is a vitalcomponent in every arena <strong>of</strong> Intelligence.2. CONCLUSION“Intelligence is an intellectual process. Regardless<strong>of</strong> the means by which it is collected, the ultimateproduct is the result <strong>of</strong> smart people ponderingwhat is known, what is unknown <strong>and</strong> trying todetermine what it all means.”Mark Lowenthal 33As referred by Dr. Lowenthal, Intelligence is anintellectual process, which ultimately relies onthe intelligence <strong>of</strong> the man behind the machine.Technology can enable this person by acting as aforce multiplier, thus enhancing his productivity<strong>and</strong> capacity to h<strong>and</strong>le information, thus enablinghim to identify answers to the question, which initself is unknown. This paper has beyond doubtproven the fact that technology plays <strong>and</strong> willplay, a critical role in every aspect <strong>of</strong> intelligencecycle i.e. the Intelligence gathering; intelligenceanalysis <strong>and</strong> intelligence dissemination; <strong>and</strong>in a way has revolutionized the way in which,intelligence as an intellectual process has evolved.The impact <strong>of</strong> technology in the various disciplines<strong>of</strong> intelligence such as Human Intelligence(HUMINT), Signals Intelligence (SIGINT),Geospatial intelligence (GEOINT), Measurement<strong>and</strong> Signature Intelligence (MASINT), Imageryintelligence (IMINT), Open source intelligence(OSINT) etc. is without any doubt indelible. Theauthor predicts that, as technology is evolving,the discipline <strong>of</strong> intelligence will also evolveto a level where technology would become aninseparable component that will metamorphosefrom a tactical force multiplier to a strategicenabler.REFERENCE AND BIBLIOGRAPHY1Sun Tzu Sun Tzu translated Griffith Samuel B, The Art <strong>of</strong> War (Oxford: Oxford University Press, 1963).2Kautilya translated by Rangarajan L.N, The Arthashastra, (New Delhi: Penguin Classics,1992).3Carl Von Clausewitz Translated by Matthijs Jolles, On War (New York: R<strong>and</strong>om House, 1943).4Jomini, Antoine-Henri, translated by Col. S.B. Holabird, Treatise on Gr<strong>and</strong> Military Operations: or A Critical<strong>and</strong> Military History <strong>of</strong> the Wars <strong>of</strong> Frederick the Great as Contrasted with the Modern System, (New York:D. van Nostr<strong>and</strong>, 1865).5Machiavelli Niccolo, The Prince -De Principatibus / Il Principe (Florence: Antonio Blado d’Asola, 1532).6Sun Tzu Sun Tzu translated Griffith Samuel B, The Art <strong>of</strong> War (Oxford: Oxford University Press, 1963).7Henry l. Stimson Center, New Information <strong>and</strong> Intelligence Needs in the 21st Century ThreatEnvironment,(Washington: Henry l. Stimson center, September 2008);8Henry l. Stimson Center, New Information <strong>and</strong> Intelligence Needs in the 21st Century ThreatEnvironment,(Washington: Henry l. Stimson center, September 2008);102The Indian <strong>Police</strong> Journal, October - December, 2012, Special Issue
9North Atlantic Treaty Organization NATO St<strong>and</strong>ardization Agency, NATO glossary <strong>of</strong> terms <strong>and</strong> definitions,AAP 6-2004,10Secrets <strong>of</strong> the spies,11http://www.eyespymag.com/SECRETS%20OF%20THE%20SPIES.pdf (Accessed on 10-09-2012)12Stallings William, Cryptography And Network Security, (New Delhi: Pearson Education, 2006).13Morgan T,” Secure satellite communication <strong>and</strong> beacon tracking device”, Technologies for Homel<strong>and</strong>Security, 2009 HST ‘09. IEEE Conference 11-12 May 2009, pp188-19214Johnson, Neil F., Duric Zoran, Jajodia Sushil, Information Hiding: Steganography <strong>and</strong> Watermarking-Attacks<strong>and</strong> Countermeasures Steganography <strong>and</strong> Watermarking - Attacks <strong>and</strong> Countermeasures (Massachusetts:Springer, 2001).15Z<strong>and</strong>er S, Armitage G, Branch P, “A Survey <strong>of</strong> Covert Channels <strong>and</strong> Countermeasures in Computer NetworkProtocols”, IEEE Communications Surveys <strong>and</strong> Tutorials, 3rd Quarter 2007, Volume: 9, Issue: 3, pp. 44-5716Based on author’s experience <strong>of</strong> using Hushmail.17Siegel Ronald, Intoxication: The Universal Drive for Mind-Altering Substances, (Vermont: Park StreetPress,2005).18Onathan Cummins, Patrick Diskin, Samuel Lau <strong>and</strong> Robert Parlett, Steganography And Digital Watermarking,School <strong>of</strong> Computer Science, The University <strong>of</strong> Birmingham,2004.19US Department <strong>of</strong> Defense, Joint Publication 1-02 Department <strong>of</strong> Defense Dictionary <strong>of</strong> Military <strong>and</strong>Associated Terms, Available at www.dtic.mil/doctrine/new_pubs/jp1_02.pdf (Accessed on 10-09-2012)20Tektronix Data Sheets for RSA3300B Series.21CDMA IS-95A <strong>and</strong> CDMA 2000 1X Interception <strong>and</strong> Logging System by Shogi Communications. http://shoghi.com.br/cdma_is_95a.htm22Moore William K, “MASINT: new eyes in the battlespace”, Military Intelligence Pr<strong>of</strong>essional Bulletin,March, 2003.23Freye Jeffrey t, Design <strong>of</strong> experiment <strong>and</strong> analysis for the joint dynamic allocation <strong>of</strong> fires <strong>and</strong> sensors(JADAFS) simulation,( CALIFORNIA: NAVAL POSTGRADUATE SCHOOL, 2007). 23Freye Jeffrey t, Design<strong>of</strong> experiment <strong>and</strong> analysis for the joint dynamic allocation <strong>of</strong> fires <strong>and</strong> sensors JADAFS) simulation,(CALIFORNIA: NAVAL POSTGRADUATE SCHOOL, 2007).24Sentinel Visual Analyzer, FMS Advanced Systems GroupAvailable at http://www.fmsasg.com/fmsasg/SocialNetworkAnalysis/ (Accessed on 10-092012)25Golliher Sean A, “Search Engine Ranking Variables <strong>and</strong> Algorithms “, semj.org volume 1, supplementalissue, august2008.26Kao Anne <strong>and</strong> Poteet Steve, Natural Language Processing <strong>and</strong> Text Mining, (London: Springer, 2006).27Holsapple, H<strong>and</strong>book <strong>of</strong> Knowledge Management, (New York: Springer, 2003).28“SPOT 6<strong>and</strong>7 products: the right balance between high resolution <strong>and</strong> large-area coverage”, Astrium EADS,Availaible at http://www.astrium-geo.com/en/147-spot-6-7 (Accessed on 10-092012)29Intelligence analysis tools <strong>and</strong> theories at intelligence gateway US Air force University http://www.au.af.mil/au/awc/awcgate/awc-ntel.htm#tools30Green Tim, “Mumbai terrorist attack”, Visual analysis, 10th February 2009, Updated on 24th March 2012,Version 1.2 GSA 2009Available at www.visualanalysis.com (Accessed on 10-092012)31Qia YiJoshi James,Tipper David <strong>and</strong> Krishnamurthy Prashant, Information Assurance: Dependability <strong>and</strong>Security in Networked Systems-Morgan Kaufmann series(Burlington: Elsevier,2008).32Stallings William, Cryptography And Network Security, (New Delhi: Pearson Education, 2006).33Dr. Mark Lowenthal is an author <strong>and</strong> Adjunct Pr<strong>of</strong>essor at the School <strong>of</strong> International <strong>and</strong> Public Affairs,Columbia University. Lowenthal has written five books <strong>and</strong> over 90 articles or studies on intelligence <strong>and</strong>national security.The Indian <strong>Police</strong> Journal, October - December, 2012, Special Issue 103
- Page 1 and 2:
The Indian Police JournalOctober -
- Page 3 and 4:
From the Director’s DeskNew Delhi
- Page 5 and 6:
23rd December, 1887: TheJourney beg
- Page 7 and 8:
Courtesy - National Archives of Ind
- Page 9 and 10:
The Logo released on the completion
- Page 11 and 12:
Helmsmen of the IB during thePre-In
- Page 13 and 14:
SHRI V.G. VAIDYA, IPS(MAR 1992 TO J
- Page 15 and 16:
“Sleeman sahib ki jai”“No Cri
- Page 17 and 18:
their life and their problems relat
- Page 19 and 20:
Settling down of criminal tribes wa
- Page 21 and 22:
perish. Between 1841 and 1848, anot
- Page 23 and 24:
In conclusion, I would like to reco
- Page 25 and 26:
own race alone, had to be withdrawn
- Page 27 and 28:
a bee in his bonnet” 17 , and abo
- Page 29 and 30:
epresented by Tilak and his followe
- Page 31 and 32:
The agency more and more fine-tuned
- Page 33 and 34:
US was brewing, one William Hopkins
- Page 35 and 36:
came under the control of Indian mi
- Page 37 and 38:
neutralised many efforts by inimica
- Page 39 and 40:
e published by the Intelligence Bur
- Page 41 and 42:
As DD (Security), IB, I had occasio
- Page 43 and 44:
Chhomohlohri, all of them juxtapose
- Page 45 and 46:
Dormers Building, ShimlaThe Dormers
- Page 47 and 48:
eforms. Warren Commission, on the a
- Page 49 and 50:
and systems will increasingly come
- Page 51 and 52:
violence and destabilisation. This
- Page 53 and 54:
one develop. The all pervasive cult
- Page 55 and 56:
etween the states and the centre su
- Page 57 and 58:
Intelligence Agencies inIndian Demo
- Page 59 and 60:
Democracies are, today, everywhere
- Page 61 and 62:
depend substantially on the restrai
- Page 63 and 64:
Of Pistols and Pigs andthe Old Tidd
- Page 65 and 66: it is lovingly caressed hundreds of
- Page 67 and 68: Through the Eyes of an IB OfficerSh
- Page 69 and 70: an Intelligence agency. He used to
- Page 71 and 72: My J&K ExperienceShri R.K. Kapoor,
- Page 73 and 74: there. We remained stranded there f
- Page 75 and 76: Scaling Himalayan Heights withthe I
- Page 77 and 78: proceed to Dungti to supervise the
- Page 79 and 80: tour of the White House and Lincoln
- Page 81 and 82: into unconsciousness two hours earl
- Page 83 and 84: which was completed successfully wi
- Page 85 and 86: leaders. This happened around the t
- Page 87 and 88: My Unforgettable Yearsin the North-
- Page 89 and 90: stated that Prakash Singh, Assistan
- Page 91 and 92: take her into confidence. That woul
- Page 93 and 94: Police - Intelligence InterfaceShri
- Page 95 and 96: Shreekant Bapat and I surveyed the
- Page 97 and 98: excellence, dedication and commitme
- Page 99 and 100: Immigration, Inter-State Disputes,
- Page 101 and 102: Observations on India’s State and
- Page 103 and 104: assessments that arose after the ca
- Page 105 and 106: levels. The deficiencies of one par
- Page 107 and 108: of laying a network of useful roads
- Page 109 and 110: Technology in Intelligence-Future S
- Page 111 and 112: These are just some of the aspects
- Page 113 and 114: Figure 6: Open Source Information o
- Page 115: events) and inference from evidence
- Page 119 and 120: Shri Dave was posted back to the lB
- Page 121 and 122: He even suggested separate pay scal
- Page 123 and 124: The Unsung HeroesThe Intelligence B