Clandestine communications in cyber-denied environments: numbers stations and radio in the 21st century/ Tony Ingesson and Magnus Anderson

By: Contributor(s): Material type: TextTextPublication details: 2024Subject(s): Online resources: In: The Journal of Policing, Intelligence and Counter Terrorism, Volume 19, Number 2, April 2024, page: 144-165Summary: Both intelligence operatives and criminals have a constant need to be able to communicate clandestinely, circumventing surveillance efforts carried out by highly capable adversaries. The recent highly-publicized breaches of internet-based clandestine communications technology and targeted malware attacks, in combination with increasingly sophisticated methods for surveillance of internet traffic has arguably resulted in a cyber-denied environment. This paper employs a red-teaming approach to explore how clandestine communications can be structured using platforms that are physically separated from the internet and thus not vulnerable to internet-based surveillance or attacks. Recent developments in computer-based radio software can be combined with legacy radio technology to provide robust solutions for clandestine communications in a cyber-denied environment.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Journal Article Mindef Library & Info Centre Journals CRIMINAL INTELLIGENCE (Browse shelf(Opens below)) Not for loan

Both intelligence operatives and criminals have a constant need to be able to communicate clandestinely, circumventing surveillance efforts carried out by highly capable adversaries. The recent highly-publicized breaches of internet-based clandestine communications technology and targeted malware attacks, in combination with increasingly sophisticated methods for surveillance of internet traffic has arguably resulted in a cyber-denied environment. This paper employs a red-teaming approach to explore how clandestine communications can be structured using platforms that are physically separated from the internet and thus not vulnerable to internet-based surveillance or attacks. Recent developments in computer-based radio software can be combined with legacy radio technology to provide robust solutions for clandestine communications in a cyber-denied environment.

CRIMINAL INTELLIGENCE, COUNTERINTELLIGENCE, NEWARTICLS

There are no comments on this title.

to post a comment.